From d2821b312a870913c05d42f973deae745cb95dbf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 15 Oct 2024 22:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-10-15T22:00:18.934243+00:00 --- CVE-2010/CVE-2010-00xx/CVE-2010-0036.json | 24 +- CVE-2010/CVE-2010-00xx/CVE-2010-0037.json | 24 +- CVE-2010/CVE-2010-00xx/CVE-2010-0047.json | 24 +- CVE-2010/CVE-2010-00xx/CVE-2010-0048.json | 24 +- CVE-2017/CVE-2017-95xx/CVE-2017-9511.json | 34 +- CVE-2021/CVE-2021-317xx/CVE-2021-31799.json | 32 +- CVE-2021/CVE-2021-431xx/CVE-2021-43114.json | 22 +- CVE-2022/CVE-2022-228xx/CVE-2022-22817.json | 22 +- CVE-2023/CVE-2023-524xx/CVE-2023-52447.json | 34 +- CVE-2024/CVE-2024-211xx/CVE-2024-21172.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21190.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21191.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21192.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21193.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21194.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21195.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21196.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21197.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21198.json | 44 +++ CVE-2024/CVE-2024-211xx/CVE-2024-21199.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21200.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21201.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21202.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21203.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21204.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21205.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21206.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21207.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21208.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21209.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21210.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21211.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21212.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21213.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21214.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21215.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21216.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21217.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21218.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21219.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21230.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21231.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21232.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21233.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21234.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21235.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21236.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21237.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21238.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21239.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21241.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21242.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21243.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21244.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21246.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21247.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21248.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21249.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21250.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21251.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21252.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21253.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21254.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21255.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21257.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21258.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21259.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21260.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21261.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21262.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21263.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21264.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21265.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21266.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21267.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21268.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21269.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21270.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21271.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21272.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21273.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21274.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21275.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21276.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21277.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21278.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21279.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21280.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21281.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21282.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21283.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21284.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21285.json | 44 +++ CVE-2024/CVE-2024-212xx/CVE-2024-21286.json | 44 +++ CVE-2024/CVE-2024-225xx/CVE-2024-22524.json | 64 +++- CVE-2024/CVE-2024-225xx/CVE-2024-22525.json | 64 +++- CVE-2024/CVE-2024-22xx/CVE-2024-2288.json | 55 ++- CVE-2024/CVE-2024-319xx/CVE-2024-31955.json | 44 +++ CVE-2024/CVE-2024-31xx/CVE-2024-3104.json | 55 ++- CVE-2024/CVE-2024-31xx/CVE-2024-3110.json | 55 ++- CVE-2024/CVE-2024-34xx/CVE-2024-3408.json | 65 +++- CVE-2024/CVE-2024-393xx/CVE-2024-39322.json | 108 +++++- CVE-2024/CVE-2024-413xx/CVE-2024-41311.json | 33 ++ CVE-2024/CVE-2024-413xx/CVE-2024-41344.json | 39 ++- CVE-2024/CVE-2024-418xx/CVE-2024-41858.json | 51 ++- CVE-2024/CVE-2024-443xx/CVE-2024-44337.json | 25 ++ CVE-2024/CVE-2024-444xx/CVE-2024-44413.json | 39 ++- CVE-2024/CVE-2024-444xx/CVE-2024-44415.json | 39 ++- CVE-2024/CVE-2024-447xx/CVE-2024-44775.json | 21 ++ CVE-2024/CVE-2024-448xx/CVE-2024-44807.json | 39 ++- CVE-2024/CVE-2024-462xx/CVE-2024-46215.json | 39 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48257.json | 41 ++- CVE-2024/CVE-2024-484xx/CVE-2024-48411.json | 21 ++ CVE-2024/CVE-2024-486xx/CVE-2024-48622.json | 39 ++- CVE-2024/CVE-2024-486xx/CVE-2024-48623.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48710.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48712.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48713.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48714.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48768.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48771.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48773.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48775.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48776.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48779.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48781.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48782.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48783.json | 21 ++ CVE-2024/CVE-2024-487xx/CVE-2024-48793.json | 27 +- CVE-2024/CVE-2024-491xx/CVE-2024-49195.json | 25 ++ CVE-2024/CVE-2024-94xx/CVE-2024-9486.json | 64 ++++ CVE-2024/CVE-2024-95xx/CVE-2024-9594.json | 64 ++++ CVE-2024/CVE-2024-96xx/CVE-2024-9676.json | 6 +- CVE-2024/CVE-2024-99xx/CVE-2024-9954.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9955.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9956.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9957.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9958.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9959.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9960.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9961.json | 37 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9962.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9963.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9964.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9965.json | 25 ++ CVE-2024/CVE-2024-99xx/CVE-2024-9966.json | 25 ++ README.md | 92 +++-- _state.csv | 368 +++++++++++++------- 148 files changed, 6124 insertions(+), 237 deletions(-) create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21172.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21190.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21191.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21192.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21193.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21194.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21195.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21196.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21197.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21198.json create mode 100644 CVE-2024/CVE-2024-211xx/CVE-2024-21199.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21200.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21201.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21202.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21203.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21204.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21205.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21206.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21207.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21208.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21209.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21210.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21211.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21212.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21213.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21214.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21215.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21216.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21217.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21218.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21219.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21230.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21231.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21232.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21233.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21234.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21235.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21236.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21237.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21238.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21239.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21241.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21242.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21243.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21244.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21246.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21247.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21248.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21249.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21250.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21251.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21252.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21253.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21254.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21255.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21257.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21258.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21259.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21260.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21261.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21262.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21263.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21264.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21265.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21266.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21267.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21268.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21269.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21270.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21271.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21272.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21273.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21274.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21275.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21276.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21277.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21278.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21279.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21280.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21281.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21282.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21283.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21284.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21285.json create mode 100644 CVE-2024/CVE-2024-212xx/CVE-2024-21286.json create mode 100644 CVE-2024/CVE-2024-319xx/CVE-2024-31955.json create mode 100644 CVE-2024/CVE-2024-413xx/CVE-2024-41311.json create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44337.json create mode 100644 CVE-2024/CVE-2024-447xx/CVE-2024-44775.json create mode 100644 CVE-2024/CVE-2024-484xx/CVE-2024-48411.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48710.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48712.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48713.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48714.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48779.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48781.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48782.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48783.json create mode 100644 CVE-2024/CVE-2024-491xx/CVE-2024-49195.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9486.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9594.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9954.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9955.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9956.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9957.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9958.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9959.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9960.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9961.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9962.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9963.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9964.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9965.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9966.json diff --git a/CVE-2010/CVE-2010-00xx/CVE-2010-0036.json b/CVE-2010/CVE-2010-00xx/CVE-2010-0036.json index 6c38b9ec206..cb2b19a0ff0 100644 --- a/CVE-2010/CVE-2010-00xx/CVE-2010-0036.json +++ b/CVE-2010/CVE-2010-00xx/CVE-2010-0036.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0036", "sourceIdentifier": "product-security@apple.com", "published": "2010-01-20T16:30:00.367", - "lastModified": "2017-08-17T01:31:51.803", + "lastModified": "2024-10-15T20:35:00.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2010/CVE-2010-00xx/CVE-2010-0037.json b/CVE-2010/CVE-2010-00xx/CVE-2010-0037.json index c7ca1e692bb..12d95028176 100644 --- a/CVE-2010/CVE-2010-00xx/CVE-2010-0037.json +++ b/CVE-2010/CVE-2010-00xx/CVE-2010-0037.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0037", "sourceIdentifier": "product-security@apple.com", "published": "2010-01-20T16:30:00.413", - "lastModified": "2017-08-17T01:31:51.850", + "lastModified": "2024-10-15T21:35:00.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2010/CVE-2010-00xx/CVE-2010-0047.json b/CVE-2010/CVE-2010-00xx/CVE-2010-0047.json index 10cc29fd4d0..eb4277004c2 100644 --- a/CVE-2010/CVE-2010-00xx/CVE-2010-0047.json +++ b/CVE-2010/CVE-2010-00xx/CVE-2010-0047.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0047", "sourceIdentifier": "product-security@apple.com", "published": "2010-03-15T13:28:25.560", - "lastModified": "2017-09-19T01:30:11.703", + "lastModified": "2024-10-15T21:35:01.283", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\n'WebKit\r\nCVE-ID: CVE-2010-0047\r\nAvailable for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,\r\nMac OS X v10.5.8, Mac OS X Server v10.5.8,\r\nMac OS X v10.6.1 or later, Mac OS X Server v10.6.1 or later,\r\nWindows 7, Vista, XP\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A use-after-free issue exists in the handling of HTML\r\nobject element fallback content. Visiting a maliciously crafted\r\nwebsite may lead to an unexpected application termination or\r\narbitrary code execution. This issue is addressed through improved\r\nmemory reference tracking. Credit to wushi of team509, working with\r\nTippingPoint's Zero Day Initiative for reporting this issue.'", @@ -18,6 +18,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2010/CVE-2010-00xx/CVE-2010-0048.json b/CVE-2010/CVE-2010-00xx/CVE-2010-0048.json index 6baf9136a94..b027d9d90b1 100644 --- a/CVE-2010/CVE-2010-00xx/CVE-2010-0048.json +++ b/CVE-2010/CVE-2010-00xx/CVE-2010-0048.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0048", "sourceIdentifier": "product-security@apple.com", "published": "2010-03-15T13:28:25.590", - "lastModified": "2017-09-19T01:30:11.767", + "lastModified": "2024-10-15T21:35:01.767", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\nCVE-ID: CVE-2010-0048\r\nAvailable for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,\r\nMac OS X v10.5.8, Mac OS X Server v10.5.8,\r\nMac OS X v10.6.1 or later, Mac OS X Server v10.6.1 or later,\r\nWindows 7, Vista, XP\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A use-after-free issue exists in WebKit's parsing of\r\nXML documents. Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution. This\r\nissue is addressed through improved memory reference tracking.\r\n", @@ -17,6 +17,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2017/CVE-2017-95xx/CVE-2017-9511.json b/CVE-2017/CVE-2017-95xx/CVE-2017-9511.json index 811cb6dc272..f1b41ef12b4 100644 --- a/CVE-2017/CVE-2017-95xx/CVE-2017-9511.json +++ b/CVE-2017/CVE-2017-95xx/CVE-2017-9511.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9511", "sourceIdentifier": "security@atlassian.com", "published": "2017-08-24T18:29:00.240", - "lastModified": "2020-11-25T14:15:12.733", + "lastModified": "2024-10-15T20:35:06.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31799.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31799.json index a3f0ba8cbde..4ab453a30a4 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31799.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31799.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31799", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-30T14:15:16.620", - "lastModified": "2024-01-05T14:15:46.040", + "lastModified": "2024-10-15T21:35:02.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-431xx/CVE-2021-43114.json b/CVE-2021/CVE-2021-431xx/CVE-2021-43114.json index 572c69174fb..bfc4809b012 100644 --- a/CVE-2021/CVE-2021-431xx/CVE-2021-43114.json +++ b/CVE-2021/CVE-2021-431xx/CVE-2021-43114.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43114", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-09T13:15:08.447", - "lastModified": "2023-12-07T22:15:08.117", + "lastModified": "2024-10-15T21:35:25.170", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-228xx/CVE-2022-22817.json b/CVE-2022/CVE-2022-228xx/CVE-2022-22817.json index 68d58736944..02387862d84 100644 --- a/CVE-2022/CVE-2022-228xx/CVE-2022-22817.json +++ b/CVE-2022/CVE-2022-228xx/CVE-2022-22817.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22817", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:12:55.160", - "lastModified": "2024-03-22T11:15:45.900", + "lastModified": "2024-10-15T21:35:25.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52447.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52447.json index dc427b01c53..9fa386ddfeb 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52447.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52447.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52447", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:08.580", - "lastModified": "2024-10-07T17:46:20.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T21:35:27.043", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json new file mode 100644 index 00000000000..1f15a59eec1 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21172", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:05.770", + "lastModified": "2024-10-15T20:15:05.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet). Supported versions that are affected are 5.6.19.19, 5.6.25.8 and 5.6.26.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5. While the vulnerability is in Oracle Hospitality OPERA 5, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality OPERA 5. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21190.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21190.json new file mode 100644 index 00000000000..a4e44053e06 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21190.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21190", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:05.973", + "lastModified": "2024-10-15T20:15:05.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Global Lifecycle Management FMW Installer product of Oracle Fusion Middleware (component: Cloning). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via SFTP to compromise Oracle Global Lifecycle Management FMW Installer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Global Lifecycle Management FMW Installer accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21191.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21191.json new file mode 100644 index 00000000000..2739a2a022c --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21191.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21191", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:06.150", + "lastModified": "2024-10-15T20:15:06.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Enterprise Manager Fusion Middleware Control product of Oracle Fusion Middleware (component: FMW Control Plugin). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Manager Fusion Middleware Control. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Manager Fusion Middleware Control, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Manager Fusion Middleware Control accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Manager Fusion Middleware Control accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21192.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21192.json new file mode 100644 index 00000000000..d5b82b3b892 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21192.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21192", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:06.340", + "lastModified": "2024-10-15T20:15:06.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Enterprise Manager for Fusion Middleware product of Oracle Fusion Middleware (component: WebLogic Mgmt). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Enterprise Manager for Fusion Middleware executes to compromise Oracle Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Manager for Fusion Middleware accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21193.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21193.json new file mode 100644 index 00000000000..498b0f210fa --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21193.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21193", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:06.533", + "lastModified": "2024-10-15T20:15:06.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21194.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21194.json new file mode 100644 index 00000000000..ff03f481db2 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21194.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21194", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:06.733", + "lastModified": "2024-10-15T20:15:06.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21195.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21195.json new file mode 100644 index 00000000000..025ce9c1833 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21195.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21195", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:06.930", + "lastModified": "2024-10-15T20:15:06.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Layout Templates). Supported versions that are affected are 7.0.0.0.0, 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle BI Publisher. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json new file mode 100644 index 00000000000..80efaa88e94 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21196", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:07.113", + "lastModified": "2024-10-15T20:15:07.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json new file mode 100644 index 00000000000..e6d35a31901 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21197", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:07.307", + "lastModified": "2024-10-15T20:15:07.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json new file mode 100644 index 00000000000..1264957cae3 --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21198", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:07.503", + "lastModified": "2024-10-15T20:15:07.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json new file mode 100644 index 00000000000..0d43fc407fb --- /dev/null +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21199", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:07.707", + "lastModified": "2024-10-15T20:15:07.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json new file mode 100644 index 00000000000..f4ec7206865 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21200", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:07.910", + "lastModified": "2024-10-15T20:15:07.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json new file mode 100644 index 00000000000..18ccd2b238e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21201", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:08.130", + "lastModified": "2024-10-15T20:15:08.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21202.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21202.json new file mode 100644 index 00000000000..b8283e8587e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21202.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21202", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:08.310", + "lastModified": "2024-10-15T20:15:08.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json new file mode 100644 index 00000000000..a0106c118ea --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21203", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:08.490", + "lastModified": "2024-10-15T20:15:08.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21204.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21204.json new file mode 100644 index 00000000000..ed2d28cb59f --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21204.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21204", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:08.673", + "lastModified": "2024-10-15T20:15:08.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21205.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21205.json new file mode 100644 index 00000000000..ec4e8f3c3bc --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21205.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21205", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:08.857", + "lastModified": "2024-10-15T20:15:08.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Service Bus product of Oracle Fusion Middleware (component: OSB Core Functionality). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Service Bus. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Service Bus accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json new file mode 100644 index 00000000000..addde140de4 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21206", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:09.050", + "lastModified": "2024-10-15T20:15:09.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json new file mode 100644 index 00000000000..06a00da4b8e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21207", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:09.243", + "lastModified": "2024-10-15T20:15:09.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38 and prior, 8.4.1 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json new file mode 100644 index 00000000000..d9aefc250cf --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21208", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:09.437", + "lastModified": "2024-10-15T20:15:09.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json new file mode 100644 index 00000000000..196f57d6872 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21209", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:09.640", + "lastModified": "2024-10-15T20:15:09.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21210.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21210.json new file mode 100644 index 00000000000..8e84996c9ca --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21210.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21210", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:09.843", + "lastModified": "2024-10-15T20:15:09.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json new file mode 100644 index 00000000000..42cb39f8a8a --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21211", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.050", + "lastModified": "2024-10-15T20:15:10.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json new file mode 100644 index 00000000000..68bd775ef1e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21212", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.237", + "lastModified": "2024-10-15T20:15:10.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json new file mode 100644 index 00000000000..56c0f4ef551 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21213", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.417", + "lastModified": "2024-10-15T20:15:10.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21214.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21214.json new file mode 100644 index 00000000000..9bb308f4903 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21214.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21214", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.607", + "lastModified": "2024-10-15T20:15:10.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21215.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21215.json new file mode 100644 index 00000000000..16f1ab7faee --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21215.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21215", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.797", + "lastModified": "2024-10-15T20:15:10.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21216.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21216.json new file mode 100644 index 00000000000..119b5872859 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21216.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21216", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:10.997", + "lastModified": "2024-10-15T20:15:10.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21217.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21217.json new file mode 100644 index 00000000000..6d3551f827f --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21217.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21217", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:11.197", + "lastModified": "2024-10-15T20:15:11.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json new file mode 100644 index 00000000000..dc2de9c0ef1 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21218", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:11.387", + "lastModified": "2024-10-15T20:15:11.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json new file mode 100644 index 00000000000..b315d59dc7f --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21219", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:11.573", + "lastModified": "2024-10-15T20:15:11.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json new file mode 100644 index 00000000000..162bc639e89 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21230", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:11.757", + "lastModified": "2024-10-15T20:15:11.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json new file mode 100644 index 00000000000..6c37205e59c --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21231", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:11.943", + "lastModified": "2024-10-15T20:15:11.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json new file mode 100644 index 00000000000..fe22a48053d --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21232", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.120", + "lastModified": "2024-10-15T20:15:12.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json new file mode 100644 index 00000000000..58ba86630f6 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21233", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.293", + "lastModified": "2024-10-15T20:15:12.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Database Core component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database Core. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Core accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21234.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21234.json new file mode 100644 index 00000000000..8cc902a24c9 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21234.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21234", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.477", + "lastModified": "2024-10-15T20:15:12.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21235.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21235.json new file mode 100644 index 00000000000..af10fc2bf25 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21235.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21235", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.643", + "lastModified": "2024-10-15T20:15:12.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json new file mode 100644 index 00000000000..4ffc7149ddb --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21236", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.810", + "lastModified": "2024-10-15T20:15:12.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json new file mode 100644 index 00000000000..98a7d4b5cdf --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21237", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:12.983", + "lastModified": "2024-10-15T20:15:12.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json new file mode 100644 index 00000000000..280b13e4966 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21238", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:13.160", + "lastModified": "2024-10-15T20:15:13.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json new file mode 100644 index 00000000000..fa697e01fb2 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21239", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:13.350", + "lastModified": "2024-10-15T20:15:13.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json new file mode 100644 index 00000000000..883f7b4d578 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21241", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:13.547", + "lastModified": "2024-10-15T20:15:13.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json new file mode 100644 index 00000000000..4544f8343a5 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21242", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:13.730", + "lastModified": "2024-10-15T20:15:13.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the XML Database component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via HTTP to compromise XML Database. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of XML Database. CVSS 3.1 Base Score 3.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json new file mode 100644 index 00000000000..f6f3c64f3ae --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21243", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:13.923", + "lastModified": "2024-10-15T20:15:13.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json new file mode 100644 index 00000000000..95e88a68a2f --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21244", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:14.130", + "lastModified": "2024-10-15T20:15:14.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21246.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21246.json new file mode 100644 index 00000000000..b90bb82e92c --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21246.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21246", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:14.327", + "lastModified": "2024-10-15T20:15:14.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Service Bus product of Oracle Fusion Middleware (component: OSB Core Functionality). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Bus. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Service Bus accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json new file mode 100644 index 00000000000..38c47f9e871 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21247", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:14.513", + "lastModified": "2024-10-15T20:15:14.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21248.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21248.json new file mode 100644 index 00000000000..42eaabfc934 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21248.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21248", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:14.707", + "lastModified": "2024-10-15T20:15:14.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 3.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json new file mode 100644 index 00000000000..f061be12385 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21249", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:14.880", + "lastModified": "2024-10-15T20:15:14.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise FIN Expenses product of Oracle PeopleSoft (component: Expenses). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Expenses. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise FIN Expenses accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json new file mode 100644 index 00000000000..1f71e84161e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21250", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:15.063", + "lastModified": "2024-10-15T20:15:15.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json new file mode 100644 index 00000000000..ac43f40dd73 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21251", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:15.257", + "lastModified": "2024-10-15T20:15:15.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21252.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21252.json new file mode 100644 index 00000000000..560dd08c3f4 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21252.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21252", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:15.450", + "lastModified": "2024-10-15T20:15:15.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Item Catalog). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21253.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21253.json new file mode 100644 index 00000000000..4f4992cb421 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21253.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21253", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:15.643", + "lastModified": "2024-10-15T20:15:15.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21254.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21254.json new file mode 100644 index 00000000000..430f3445486 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21254.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21254", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:15.853", + "lastModified": "2024-10-15T20:15:15.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 7.0.0.0.0, 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21255.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21255.json new file mode 100644 index 00000000000..35cd2a84f28 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21255.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21255", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.040", + "lastModified": "2024-10-15T20:15:16.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: XMLPublisher). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json new file mode 100644 index 00000000000..a187aa2533e --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21257", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.220", + "lastModified": "2024-10-15T20:15:16.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.2.18.0.000. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Hyperion BI+ executes to compromise Oracle Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hyperion BI+ accessible data. CVSS 3.1 Base Score 3.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json new file mode 100644 index 00000000000..0fdd7c32281 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21258", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.410", + "lastModified": "2024-10-15T20:15:16.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json new file mode 100644 index 00000000000..31fe3f207ac --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21259", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.590", + "lastModified": "2024-10-15T20:15:16.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json new file mode 100644 index 00000000000..fd914103d82 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21260", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.777", + "lastModified": "2024-10-15T20:15:16.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json new file mode 100644 index 00000000000..b21e2f124b3 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21261", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:16.960", + "lastModified": "2024-10-15T20:15:16.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. While the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json new file mode 100644 index 00000000000..2156b2322ca --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21262", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:17.157", + "lastModified": "2024-10-15T20:15:17.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 9.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21263.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21263.json new file mode 100644 index 00000000000..27c3d2fcbd2 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21263.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21263", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:17.340", + "lastModified": "2024-10-15T20:15:17.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json new file mode 100644 index 00000000000..41afe8fb5ea --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21264", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:17.533", + "lastModified": "2024-10-15T20:15:17.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Activity Guide Composer). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json new file mode 100644 index 00000000000..62536958b68 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21265", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:17.713", + "lastModified": "2024-10-15T20:15:17.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Site Hub product of Oracle E-Business Suite (component: Site Hierarchy Flows). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Site Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Site Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Site Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json new file mode 100644 index 00000000000..aa01af457cd --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21266", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:17.910", + "lastModified": "2024-10-15T20:15:17.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Advanced Pricing product of Oracle E-Business Suite (component: Price List). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Advanced Pricing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Pricing accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Pricing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json new file mode 100644 index 00000000000..88fe3547825 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21267", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.090", + "lastModified": "2024-10-15T20:15:18.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Cost Management product of Oracle E-Business Suite (component: Cost Planning). Supported versions that are affected are 12.2.12-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Cost Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Cost Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Cost Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json new file mode 100644 index 00000000000..99b776d750d --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21268", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.267", + "lastModified": "2024-10-15T20:15:18.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.2.11-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json new file mode 100644 index 00000000000..6abdc304482 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21269", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.437", + "lastModified": "2024-10-15T20:15:18.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Incentive Compensation product of Oracle E-Business Suite (component: Compensation Plan). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Incentive Compensation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Incentive Compensation accessible data as well as unauthorized access to critical data or complete access to all Oracle Incentive Compensation accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json new file mode 100644 index 00000000000..f0f8f7c1ee1 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21270", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.610", + "lastModified": "2024-10-15T20:15:18.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.2.6-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Common Applications Calendar accessible data as well as unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json new file mode 100644 index 00000000000..c1e50021309 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21271", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.787", + "lastModified": "2024-10-15T20:15:18.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Field Service Engineer Portal). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json new file mode 100644 index 00000000000..716b97a40e5 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21272", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:18.963", + "lastModified": "2024-10-15T20:15:18.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21273.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21273.json new file mode 100644 index 00000000000..6f06e92c2fe --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21273.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21273", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:19.140", + "lastModified": "2024-10-15T20:15:19.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json new file mode 100644 index 00000000000..5bd553fedcf --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21274", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:19.337", + "lastModified": "2024-10-15T20:15:19.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json new file mode 100644 index 00000000000..6b865295dc1 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21275", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:19.520", + "lastModified": "2024-10-15T20:15:19.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Quoting product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.7-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Quoting. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Quoting accessible data as well as unauthorized access to critical data or complete access to all Oracle Quoting accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json new file mode 100644 index 00000000000..452d05125cb --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21276", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:19.693", + "lastModified": "2024-10-15T20:15:19.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Work in Process product of Oracle E-Business Suite (component: Messages). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Work in Process. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Work in Process accessible data as well as unauthorized access to critical data or complete access to all Oracle Work in Process accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json new file mode 100644 index 00000000000..04a047dee92 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21277", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:19.873", + "lastModified": "2024-10-15T20:15:19.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle MES for Process Manufacturing product of Oracle E-Business Suite (component: Device Integration). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle MES for Process Manufacturing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle MES for Process Manufacturing accessible data as well as unauthorized access to critical data or complete access to all Oracle MES for Process Manufacturing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json new file mode 100644 index 00000000000..cd324d454cc --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21278", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:20.070", + "lastModified": "2024-10-15T20:15:20.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Contract Lifecycle Management for Public Sector product of Oracle E-Business Suite (component: Award Processes). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Contract Lifecycle Management for Public Sector. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Contract Lifecycle Management for Public Sector accessible data as well as unauthorized access to critical data or complete access to all Oracle Contract Lifecycle Management for Public Sector accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json new file mode 100644 index 00000000000..7b602ee4ce8 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21279", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:20.257", + "lastModified": "2024-10-15T20:15:20.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Sourcing product of Oracle E-Business Suite (component: Auctions). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Sourcing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Sourcing accessible data as well as unauthorized access to critical data or complete access to all Oracle Sourcing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json new file mode 100644 index 00000000000..ed034880285 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21280", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:20.453", + "lastModified": "2024-10-15T20:15:20.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Service Contracts product of Oracle E-Business Suite (component: Authoring). Supported versions that are affected are 12.2.5-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Service Contracts. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Service Contracts accessible data as well as unauthorized access to critical data or complete access to all Oracle Service Contracts accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json new file mode 100644 index 00000000000..5dec13c41de --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21281", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:20.647", + "lastModified": "2024-10-15T20:15:20.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.7.0.6.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Liquidity Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Liquidity Management accessible data as well as unauthorized read access to a subset of Oracle Banking Liquidity Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Liquidity Management. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json new file mode 100644 index 00000000000..5ecde904c39 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21282", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:20.830", + "lastModified": "2024-10-15T20:15:20.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Financials product of Oracle E-Business Suite (component: Common Components). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financials. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financials accessible data as well as unauthorized access to critical data or complete access to all Oracle Financials accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json new file mode 100644 index 00000000000..dd9b05c471c --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21283", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:21.033", + "lastModified": "2024-10-15T20:15:21.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Global Payroll for Core). Supported versions that are affected are 9.2.48-9.2.50. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21284.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21284.json new file mode 100644 index 00000000000..b11a91471db --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21284.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21284", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:21.257", + "lastModified": "2024-10-15T20:15:21.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports). The supported version that is affected is 14.5.0.12.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Liquidity Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Banking Liquidity Management. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21285.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21285.json new file mode 100644 index 00000000000..fba4d38517d --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21285.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21285", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:21.447", + "lastModified": "2024-10-15T20:15:21.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports). The supported version that is affected is 14.5.0.12.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Liquidity Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Banking Liquidity Management. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json new file mode 100644 index 00000000000..070e4e2c295 --- /dev/null +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-21286", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2024-10-15T20:15:21.633", + "lastModified": "2024-10-15T20:15:21.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise ELM Enterprise Learning Management product of Oracle PeopleSoft (component: Enterprise Learning Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise ELM Enterprise Learning Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise ELM Enterprise Learning Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise ELM Enterprise Learning Management accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise ELM Enterprise Learning Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json index 72f775e808e..2339f78f08f 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22524", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.043", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:41:01.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "dnspod-sr 0dfbd37 es vulnerable al desbordamiento del b\u00fafer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DNSPod/dnspod-sr/issues/60", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json index eb59f7efb28..a1241f076ed 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22525", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.127", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:37:23.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "dnspod-sr 0dfbd37 contiene un SEGV." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DNSPod/dnspod-sr/issues/61", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json index 9071b7fbe1d..5032216054d 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2288", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.137", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:31:45.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.3", + "matchCriteriaId": "E2C1D155-6462-4E2F-AAEC-BF1D70ACBD6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/ed085e6effab2b1e25ba2b00366a16ff67d8551b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/2a37ae0c-890a-401a-8f3c-a261f3006290", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json new file mode 100644 index 00000000000..50314883a17 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-31955", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:10.690", + "lastModified": "2024-10-15T21:15:10.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung eMMC with KLMAG2GE4A and KLM8G1WEMB firmware. Code bypass through Electromagnetic Fault Injection allows an attacker to successfully authenticate and write to the RPMB (Replay Protected Memory Block) area without possessing secret information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json index 48098157296..63495343509 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3104", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:17.260", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:21:54.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/bfedfebfab032e6f4d5a369c8a2f947c5d0c5286", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/4f2fcb45-5828-4bec-985a-9d3a0ee00462", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json index b9ee1b35a4a..e8fd239961a 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3110", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:59.900", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:01:31.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/49f30e051c9f6e28977d57d0e5f49c1294094e41", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/c2895978-364d-412d-8825-c806606bcb85", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json index 3a5dc9bf402..34b0d44513f 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3408", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:01.890", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:14:21.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,22 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +87,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:man:d-tale:3.10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "70791772-1BB6-4BEE-A4ED-5DD62532E3C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/57a06666-ff85-4577-af19-f3dfb7b02f91", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json index b0812fd8de7..7e92208761f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39322", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-02T21:15:10.997", - "lastModified": "2024-07-03T12:53:24.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:47:03.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,30 +81,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos_project:ai-controller-frontend:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.10.13", + "matchCriteriaId": "C45182A8-B450-4945-913E-AF1DA2E359CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos_project:ai-controller-frontend:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2021.04.1", + "versionEndExcluding": "2021.10.6", + "matchCriteriaId": "0D3C76AD-CE98-445C-9269-43136E83B546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos_project:ai-controller-frontend:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022.04.1", + "versionEndExcluding": "2022.10.3", + "matchCriteriaId": "705119C6-A65C-497C-A609-E4AC45A0434E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos_project:ai-controller-frontend:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.04.1", + "versionEndExcluding": "2023.10.4", + "matchCriteriaId": "BBD12E8E-F80E-4CAF-89D7-8A8467F43908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimeos_project:ai-controller-frontend:2024.04.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B525E59F-606E-4777-9395-17F8B49E76BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/02a063fbd616d4e0a5aaf89f1642a856aa5ac5a5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/16d013d0e28cecd19781f434d83fabebcc78cdc2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/4c966e02bd52589c3c9382777cfe170eddf17b00", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/640954243ce85c2c303a00dd6481ed39b3d218fb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-admin-jsonadm/commit/7d1c05e8368b0a6419820fe402deac9960500026", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aimeos/ai-admin-jsonadm/security/advisories/GHSA-8fj2-587w-5whr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json new file mode 100644 index 00000000000..0767fce6646 --- /dev/null +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41311.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-41311", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:10.923", + "lastModified": "2024-10-15T21:15:10.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Libheif 1.17.6, insufficient checks in ImageOverlay::parse() decoding a heif file containing an overlay image with forged offsets can lead to an out-of-bounds read and write." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/flyyee/79f1b224069842ee320115cafa5c35c0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/strukturag/libheif/commit/a3ed1b1eb178c5d651d6ac619c8da3d71ac2be36", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/strukturag/libheif/issues/1226", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/strukturag/libheif/pull/1227", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json index 93a8cd102ce..ccaad0d189a 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41344", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T19:15:17.287", - "lastModified": "2024-10-15T19:15:17.287", + "lastModified": "2024-10-15T20:35:11.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264", diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json index eb8d7160c05..a60738e2f64 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41858", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T09:15:12.450", - "lastModified": "2024-08-14T13:00:37.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T20:51:31.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*", + "versionEndIncluding": "18.5.2", + "matchCriteriaId": "EECBD44A-3190-4AEB-81A2-DBD14553DE1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.4", + "matchCriteriaId": "A84CD9A2-4843-4FED-8665-54B9D3EEB2E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/incopy/apsb24-64.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44337.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44337.json new file mode 100644 index 00000000000..1c11ae07823 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44337.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44337", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T20:15:21.850", + "lastModified": "2024-10-15T20:15:21.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Brinmon/CVE-2024-44337", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gomarkdown/markdown/commit/a2a9c4f76ef5a5c32108e36f7c47f8d310322252", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44413.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44413.json index 8bb70123e90..cadaa7c4d11 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44413.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44413.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44413", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T17:15:03.790", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:28.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad en DI_8200-16.07.26A1, que se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n upgrade_filter_asp en el archivo upgrade_filter.asp. La manipulaci\u00f3n del par\u00e1metro path puede provocar la inyecci\u00f3n de comandos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/IotChan/cve/blob/main/dlink/di-8300/CVE-2024-44413", diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44415.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44415.json index 12cdb289229..9265b4c9bcd 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44415.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44415.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44415", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T17:15:03.967", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:29.017", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad en DI_8200-16.07.26A1, hay un desbordamiento de b\u00fafer en la funci\u00f3n dbsrv_asp; la funci\u00f3n strcpy se ejecuta sin verificar la longitud de la cadena, lo que genera un desbordamiento de b\u00fafer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/IotChan/cve/blob/main/dlink/DI-8200/CVE-2024-44415", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44775.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44775.json new file mode 100644 index 00000000000..19c0ac82702 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44775.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44775", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:10.990", + "lastModified": "2024-10-15T21:15:10.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in kmqtt v0.2.7 allows attackers to cause a Denial of Service(DoS) via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/pengwGit/26fd8630392af5d8829c2e220091ac4f", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44807.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44807.json index 6a8fa771288..b7974c886ab 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44807.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44807", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T18:15:08.133", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:29.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema de listado de directorios en el complemento baserCMS en D-ZERO CO., LTD. BurgerEditor y BurgerEditor Limited Edition anteriores a la versi\u00f3n 2.25.1 permite a atacantes remotos obtener informaci\u00f3n confidencial al exponer una lista de los archivos cargados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "http://basercms.com", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46215.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46215.json index 10fc440451e..d8f123abb87 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46215.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46215.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46215", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T17:15:04.260", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:30.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 una vulnerabilidad en KM08-708H-v1.1, hay un desbordamiento de b\u00fafer en la funci\u00f3n sub_445BDC() dentro del programa /usr/sbin/goahead; la funci\u00f3n strcpy se ejecuta sin verificar la longitud de la cadena, lo que genera un desbordamiento de b\u00fafer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/IotChan/cve/blob/main/KT/CVE-2024-46215", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json index a9b519f8196..477d0339825 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48257", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:13.947", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T20:35:12.940", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Wavelog 1.8.5 permite la inyecci\u00f3n SQL de Oqrs_model.php get_worked_modes station_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48411.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48411.json new file mode 100644 index 00000000000..cdeede6574b --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48411.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48411", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.060", + "lastModified": "2024-10-15T21:15:11.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "itsourcecode Online Tours and Travels Management System v1.0 is vulnerable to SQL Injection (SQLI) via a crafted payload to the val-email parameter in forget_password.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Comitora/CVEs/blob/main/CVE-2024-48411", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48622.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48622.json index 55115dee784..5c23ec47a3a 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48622.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48622.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48622", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T16:15:05.680", - "lastModified": "2024-10-15T16:15:05.680", + "lastModified": "2024-10-15T21:35:31.373", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A cross-site scripting (XSS) issue in DomainMOD below v4.12.0 allows remote attackers to inject JavaScript code via admin/domain-fields/edit.php and the cdfid parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/domainmod/domainmod/issues/174", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48623.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48623.json index 8355269e099..69b3049fa73 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48623.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48623.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48623", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T16:15:05.767", - "lastModified": "2024-10-15T16:15:05.767", + "lastModified": "2024-10-15T21:35:32.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In queue\\index.php of DomainMOD below v4.12.0, the list_id and domain_id parameters in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/domainmod/domainmod/issues/176", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48710.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48710.json new file mode 100644 index 00000000000..531ee56055b --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48710.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48710", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.123", + "lastModified": "2024-10-15T21:15:11.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TP-Link TL-WDR7660 1.0, the wlanTimerRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sezangel/IOT-vul/blob/main/TPlink/TL-WDR7660/1/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48712.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48712.json new file mode 100644 index 00000000000..36b161ff30e --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48712.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48712", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.177", + "lastModified": "2024-10-15T21:15:11.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sezangel/IOT-vul/blob/main/TPlink/TL-WDR7660/3/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48713.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48713.json new file mode 100644 index 00000000000..8a4a0119c62 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48713.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48713", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.227", + "lastModified": "2024-10-15T21:15:11.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sezangel/IOT-vul/blob/main/TPlink/TL-WDR7660/4/read.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48714.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48714.json new file mode 100644 index 00000000000..574b2549946 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48714.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48714", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.277", + "lastModified": "2024-10-15T21:15:11.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sezangel/IOT-vul/tree/main/TPlink/TL-WDR7660/2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48768.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48768.json index d5114722de8..7426028d8f8 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48768.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48768.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48768", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.253", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:32.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en almaodo GmbH appinventor.ai_google.almando_control 2.3.1 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n de firmware" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://appinventoraigooglealmandocontrol.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48771.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48771.json index b669f3bd559..2b6f3605801 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48771.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48771.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48771", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.537", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:33.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en la aplicaci\u00f3n Almando Play de almando GmbH (com.almando.play) 1.8.2 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://almando.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48773.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48773.json index daeeb2f3c31..1f5cf601772 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48773.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48773", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.637", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T20:35:14.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en WoFit v.7.2.3 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://comchenyumorepro.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48775.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48775.json index 796f173d61f..3ae1b274c2e 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48775.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48775.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48775", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.810", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T20:35:14.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Plug n Play Camera com.ezset.delaney 1.2.0 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://comezsetdelaney.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48776.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48776.json index cb6240279a5..b4aa9e2c1ab 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48776.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48776.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48776", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.903", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T20:35:15.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Shelly com.home.shelly 1.0.4 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n de firmware" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://comhomeshelly.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48779.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48779.json new file mode 100644 index 00000000000..bade30b9473 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48779.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48779", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.340", + "lastModified": "2024-10-15T21:15:11.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Wanxing Technology's Yitu project Management Software 3.2.2 allows a remote attacker to execute arbitrary code via the platformpluginpath parameter to specify that the qt plugin loads the directory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/zty-1995/3fcdf702017ad6721e5011f74c1f6cee", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48781.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48781.json new file mode 100644 index 00000000000..4e06220ba4b --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48781.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48781", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.400", + "lastModified": "2024-10-15T21:15:11.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Wanxing Technology Yitu Project Management Kirin Edition 2.3.6 allows a remote attacker to execute arbitrary code via a specially constructed so file/opt/EdrawProj-2/plugins/imageformat." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/zty-1995/a7948be24b3411759a6afa3cc616dc12", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48782.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48782.json new file mode 100644 index 00000000000..07d5e23917d --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48782.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48782", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.450", + "lastModified": "2024-10-15T21:15:11.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in DYCMS Open-Source Version v2.0.9.41 allows a remote attacker to execute arbitrary code via the application only detecting the extension of image files in the front-end." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/zty-1995/7750a2ea1231971f973f02dc4c893b46", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48783.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48783.json new file mode 100644 index 00000000000..a4fab878ea5 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48783.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48783", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T21:15:11.510", + "lastModified": "2024-10-15T21:15:11.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Ruijie NBR3000D-E Gateway allows a remote attacker to obtain sensitive information via the /tool/shell/postgresql.conf component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/zty-1995/8495b81e8d257e8f6df102a32ec3c583", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json index f5f0aeca177..f29367e7b4e 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48793.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48793", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T18:15:05.620", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T21:35:34.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en INATRONIC com.inatronic.bmw 2.7.1 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://drivedeck.de/", diff --git a/CVE-2024/CVE-2024-491xx/CVE-2024-49195.json b/CVE-2024/CVE-2024-491xx/CVE-2024-49195.json new file mode 100644 index 00000000000..e8cfd4744af --- /dev/null +++ b/CVE-2024/CVE-2024-491xx/CVE-2024-49195.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-49195", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T20:15:21.950", + "lastModified": "2024-10-15T20:15:21.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mbed TLS 3.5.x through 3.6.x before 3.6.2 has a buffer underrun in pkwrite when writing an opaque key pair" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-10-1/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9486.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9486.json new file mode 100644 index 00000000000..a287c62476c --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9486.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-9486", + "sourceIdentifier": "jordan@liggitt.net", + "published": "2024-10-15T21:15:11.573", + "lastModified": "2024-10-15T21:15:11.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project with its Proxmox provider." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kubernetes-sigs/image-builder/pull/1595", + "source": "jordan@liggitt.net" + }, + { + "url": "https://github.com/kubernetes/kubernetes/issues/128006", + "source": "jordan@liggitt.net" + }, + { + "url": "https://groups.google.com/g/kubernetes-security-announce/c/UKJG-oZogfA/m/Lu1hcnHmAQAJ", + "source": "jordan@liggitt.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9594.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9594.json new file mode 100644 index 00000000000..4b479d02bed --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9594.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-9594", + "sourceIdentifier": "jordan@liggitt.net", + "published": "2024-10-15T21:15:11.790", + "lastModified": "2024-10-15T21:15:11.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process\u00a0when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kubernetes-sigs/image-builder/pull/1596", + "source": "jordan@liggitt.net" + }, + { + "url": "https://github.com/kubernetes/kubernetes/issues/128007", + "source": "jordan@liggitt.net" + }, + { + "url": "https://groups.google.com/g/kubernetes-security-announce/c/UKJG-oZogfA/m/Lu1hcnHmAQAJ", + "source": "jordan@liggitt.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json index d2c0bab01cc..a8a8a31b6d8 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9676", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-15T16:15:06.933", - "lastModified": "2024-10-15T16:15:06.933", + "lastModified": "2024-10-15T21:15:11.990", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317467", "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/advisories/GHSA-wq2p-5pc6-wpgf", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9954.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9954.json new file mode 100644 index 00000000000..ce727c5a961 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9954.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9954", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.110", + "lastModified": "2024-10-15T21:15:12.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in AI in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/367755363", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json new file mode 100644 index 00000000000..16b0d8e5b64 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9955", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.193", + "lastModified": "2024-10-15T21:15:12.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in WebAuthentication in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/370133761", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json new file mode 100644 index 00000000000..8062da53358 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9956", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.267", + "lastModified": "2024-10-15T21:15:12.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in WebAuthentication in Google Chrome on Android prior to 130.0.6723.58 allowed a local attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/370482421", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json new file mode 100644 index 00000000000..cf17d75785f --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9957", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.320", + "lastModified": "2024-10-15T21:15:12.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in UI in Google Chrome on iOS prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/358151317", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9958.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9958.json new file mode 100644 index 00000000000..732c8d73688 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9958.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9958", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.397", + "lastModified": "2024-10-15T21:15:12.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in PictureInPicture in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/40076120", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json new file mode 100644 index 00000000000..89d47670cf1 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9959", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.447", + "lastModified": "2024-10-15T21:15:12.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in DevTools in Google Chrome prior to 130.0.6723.58 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/368672129", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json new file mode 100644 index 00000000000..65b46e42886 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9960", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.520", + "lastModified": "2024-10-15T21:15:12.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Dawn in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/354748063", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json new file mode 100644 index 00000000000..19d4286deb1 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-9961", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.597", + "lastModified": "2024-10-15T21:15:12.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in ParcelTracking in Google Chrome on iOS prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/357776197", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9962.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9962.json new file mode 100644 index 00000000000..6f259628a36 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9962.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9962", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.670", + "lastModified": "2024-10-15T21:15:12.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Permissions in Google Chrome prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/364508693", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9963.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9963.json new file mode 100644 index 00000000000..d9664296925 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9963.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9963", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.723", + "lastModified": "2024-10-15T21:15:12.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in Downloads in Google Chrome prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/328278718", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9964.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9964.json new file mode 100644 index 00000000000..22fd6f69aaa --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9964.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9964", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.790", + "lastModified": "2024-10-15T21:15:12.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Payments in Google Chrome prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/361711121", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9965.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9965.json new file mode 100644 index 00000000000..90b0e976b8f --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9965.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9965", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.837", + "lastModified": "2024-10-15T21:15:12.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in DevTools in Google Chrome on Windows prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/352651673", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9966.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9966.json new file mode 100644 index 00000000000..e0e52b2d65f --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9966.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9966", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-10-15T21:15:12.890", + "lastModified": "2024-10-15T21:15:12.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Navigations in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/364773822", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 87a8a69bd30..6719921790d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-15T20:00:18.097712+00:00 +2024-10-15T22:00:18.934243+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-15T19:51:10.393000+00:00 +2024-10-15T21:35:34.713000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265607 +265721 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` - -- [CVE-2024-35584](CVE-2024/CVE-2024-355xx/CVE-2024-35584.json) (`2024-10-15T19:15:16.957`) -- [CVE-2024-41344](CVE-2024/CVE-2024-413xx/CVE-2024-41344.json) (`2024-10-15T19:15:17.287`) -- [CVE-2024-5749](CVE-2024/CVE-2024-57xx/CVE-2024-5749.json) (`2024-10-15T18:15:05.997`) +Recently added CVEs: `114` + +- [CVE-2024-48411](CVE-2024/CVE-2024-484xx/CVE-2024-48411.json) (`2024-10-15T21:15:11.060`) +- [CVE-2024-48710](CVE-2024/CVE-2024-487xx/CVE-2024-48710.json) (`2024-10-15T21:15:11.123`) +- [CVE-2024-48712](CVE-2024/CVE-2024-487xx/CVE-2024-48712.json) (`2024-10-15T21:15:11.177`) +- [CVE-2024-48713](CVE-2024/CVE-2024-487xx/CVE-2024-48713.json) (`2024-10-15T21:15:11.227`) +- [CVE-2024-48714](CVE-2024/CVE-2024-487xx/CVE-2024-48714.json) (`2024-10-15T21:15:11.277`) +- [CVE-2024-48779](CVE-2024/CVE-2024-487xx/CVE-2024-48779.json) (`2024-10-15T21:15:11.340`) +- [CVE-2024-48781](CVE-2024/CVE-2024-487xx/CVE-2024-48781.json) (`2024-10-15T21:15:11.400`) +- [CVE-2024-48782](CVE-2024/CVE-2024-487xx/CVE-2024-48782.json) (`2024-10-15T21:15:11.450`) +- [CVE-2024-48783](CVE-2024/CVE-2024-487xx/CVE-2024-48783.json) (`2024-10-15T21:15:11.510`) +- [CVE-2024-49195](CVE-2024/CVE-2024-491xx/CVE-2024-49195.json) (`2024-10-15T20:15:21.950`) +- [CVE-2024-9486](CVE-2024/CVE-2024-94xx/CVE-2024-9486.json) (`2024-10-15T21:15:11.573`) +- [CVE-2024-9594](CVE-2024/CVE-2024-95xx/CVE-2024-9594.json) (`2024-10-15T21:15:11.790`) +- [CVE-2024-9954](CVE-2024/CVE-2024-99xx/CVE-2024-9954.json) (`2024-10-15T21:15:12.110`) +- [CVE-2024-9955](CVE-2024/CVE-2024-99xx/CVE-2024-9955.json) (`2024-10-15T21:15:12.193`) +- [CVE-2024-9956](CVE-2024/CVE-2024-99xx/CVE-2024-9956.json) (`2024-10-15T21:15:12.267`) +- [CVE-2024-9957](CVE-2024/CVE-2024-99xx/CVE-2024-9957.json) (`2024-10-15T21:15:12.320`) +- [CVE-2024-9958](CVE-2024/CVE-2024-99xx/CVE-2024-9958.json) (`2024-10-15T21:15:12.397`) +- [CVE-2024-9959](CVE-2024/CVE-2024-99xx/CVE-2024-9959.json) (`2024-10-15T21:15:12.447`) +- [CVE-2024-9960](CVE-2024/CVE-2024-99xx/CVE-2024-9960.json) (`2024-10-15T21:15:12.520`) +- [CVE-2024-9961](CVE-2024/CVE-2024-99xx/CVE-2024-9961.json) (`2024-10-15T21:15:12.597`) +- [CVE-2024-9962](CVE-2024/CVE-2024-99xx/CVE-2024-9962.json) (`2024-10-15T21:15:12.670`) +- [CVE-2024-9963](CVE-2024/CVE-2024-99xx/CVE-2024-9963.json) (`2024-10-15T21:15:12.723`) +- [CVE-2024-9964](CVE-2024/CVE-2024-99xx/CVE-2024-9964.json) (`2024-10-15T21:15:12.790`) +- [CVE-2024-9965](CVE-2024/CVE-2024-99xx/CVE-2024-9965.json) (`2024-10-15T21:15:12.837`) +- [CVE-2024-9966](CVE-2024/CVE-2024-99xx/CVE-2024-9966.json) (`2024-10-15T21:15:12.890`) ### CVEs modified in the last Commit -Recently modified CVEs: `93` - -- [CVE-2024-48786](CVE-2024/CVE-2024-487xx/CVE-2024-48786.json) (`2024-10-15T19:35:43.413`) -- [CVE-2024-48787](CVE-2024/CVE-2024-487xx/CVE-2024-48787.json) (`2024-10-15T19:35:44.190`) -- [CVE-2024-48788](CVE-2024/CVE-2024-487xx/CVE-2024-48788.json) (`2024-10-15T19:35:44.980`) -- [CVE-2024-4889](CVE-2024/CVE-2024-48xx/CVE-2024-4889.json) (`2024-10-15T19:00:09.633`) -- [CVE-2024-48915](CVE-2024/CVE-2024-489xx/CVE-2024-48915.json) (`2024-10-15T19:35:45.867`) -- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-15T18:56:52.363`) -- [CVE-2024-7038](CVE-2024/CVE-2024-70xx/CVE-2024-7038.json) (`2024-10-15T19:04:48.627`) -- [CVE-2024-8690](CVE-2024/CVE-2024-86xx/CVE-2024-8690.json) (`2024-10-15T18:38:32.260`) -- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-15T19:15:17.707`) -- [CVE-2024-9469](CVE-2024/CVE-2024-94xx/CVE-2024-9469.json) (`2024-10-15T18:38:25.647`) -- [CVE-2024-9473](CVE-2024/CVE-2024-94xx/CVE-2024-9473.json) (`2024-10-15T18:54:54.560`) -- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-15T19:12:36.503`) -- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-15T18:46:53.397`) -- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-15T19:14:42.600`) -- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-15T19:17:27.083`) -- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-15T19:18:27.987`) -- [CVE-2024-9808](CVE-2024/CVE-2024-98xx/CVE-2024-9808.json) (`2024-10-15T19:19:57.720`) -- [CVE-2024-9809](CVE-2024/CVE-2024-98xx/CVE-2024-9809.json) (`2024-10-15T19:21:13.343`) -- [CVE-2024-9810](CVE-2024/CVE-2024-98xx/CVE-2024-9810.json) (`2024-10-15T19:22:00.260`) -- [CVE-2024-9811](CVE-2024/CVE-2024-98xx/CVE-2024-9811.json) (`2024-10-15T19:22:35.447`) -- [CVE-2024-9812](CVE-2024/CVE-2024-98xx/CVE-2024-9812.json) (`2024-10-15T19:22:51.340`) -- [CVE-2024-9813](CVE-2024/CVE-2024-98xx/CVE-2024-9813.json) (`2024-10-15T19:23:28.953`) -- [CVE-2024-9859](CVE-2024/CVE-2024-98xx/CVE-2024-9859.json) (`2024-10-15T19:35:46.273`) -- [CVE-2024-9973](CVE-2024/CVE-2024-99xx/CVE-2024-9973.json) (`2024-10-15T19:27:44.020`) -- [CVE-2024-9974](CVE-2024/CVE-2024-99xx/CVE-2024-9974.json) (`2024-10-15T19:28:37.377`) +Recently modified CVEs: `32` + +- [CVE-2022-22817](CVE-2022/CVE-2022-228xx/CVE-2022-22817.json) (`2024-10-15T21:35:25.423`) +- [CVE-2023-52447](CVE-2023/CVE-2023-524xx/CVE-2023-52447.json) (`2024-10-15T21:35:27.043`) +- [CVE-2024-22524](CVE-2024/CVE-2024-225xx/CVE-2024-22524.json) (`2024-10-15T20:41:01.773`) +- [CVE-2024-22525](CVE-2024/CVE-2024-225xx/CVE-2024-22525.json) (`2024-10-15T20:37:23.253`) +- [CVE-2024-2288](CVE-2024/CVE-2024-22xx/CVE-2024-2288.json) (`2024-10-15T20:31:45.067`) +- [CVE-2024-3104](CVE-2024/CVE-2024-31xx/CVE-2024-3104.json) (`2024-10-15T20:21:54.380`) +- [CVE-2024-3110](CVE-2024/CVE-2024-31xx/CVE-2024-3110.json) (`2024-10-15T20:01:31.567`) +- [CVE-2024-3408](CVE-2024/CVE-2024-34xx/CVE-2024-3408.json) (`2024-10-15T20:14:21.870`) +- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-10-15T20:47:03.383`) +- [CVE-2024-41344](CVE-2024/CVE-2024-413xx/CVE-2024-41344.json) (`2024-10-15T20:35:11.023`) +- [CVE-2024-41858](CVE-2024/CVE-2024-418xx/CVE-2024-41858.json) (`2024-10-15T20:51:31.423`) +- [CVE-2024-44413](CVE-2024/CVE-2024-444xx/CVE-2024-44413.json) (`2024-10-15T21:35:28.267`) +- [CVE-2024-44415](CVE-2024/CVE-2024-444xx/CVE-2024-44415.json) (`2024-10-15T21:35:29.017`) +- [CVE-2024-44807](CVE-2024/CVE-2024-448xx/CVE-2024-44807.json) (`2024-10-15T21:35:29.807`) +- [CVE-2024-46215](CVE-2024/CVE-2024-462xx/CVE-2024-46215.json) (`2024-10-15T21:35:30.590`) +- [CVE-2024-48257](CVE-2024/CVE-2024-482xx/CVE-2024-48257.json) (`2024-10-15T20:35:12.940`) +- [CVE-2024-48622](CVE-2024/CVE-2024-486xx/CVE-2024-48622.json) (`2024-10-15T21:35:31.373`) +- [CVE-2024-48623](CVE-2024/CVE-2024-486xx/CVE-2024-48623.json) (`2024-10-15T21:35:32.163`) +- [CVE-2024-48768](CVE-2024/CVE-2024-487xx/CVE-2024-48768.json) (`2024-10-15T21:35:32.950`) +- [CVE-2024-48771](CVE-2024/CVE-2024-487xx/CVE-2024-48771.json) (`2024-10-15T21:35:33.747`) +- [CVE-2024-48773](CVE-2024/CVE-2024-487xx/CVE-2024-48773.json) (`2024-10-15T20:35:14.183`) +- [CVE-2024-48775](CVE-2024/CVE-2024-487xx/CVE-2024-48775.json) (`2024-10-15T20:35:14.947`) +- [CVE-2024-48776](CVE-2024/CVE-2024-487xx/CVE-2024-48776.json) (`2024-10-15T20:35:15.697`) +- [CVE-2024-48793](CVE-2024/CVE-2024-487xx/CVE-2024-48793.json) (`2024-10-15T21:35:34.713`) +- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-10-15T21:15:11.990`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c706279636e..edf2214cc09 100644 --- a/_state.csv +++ b/_state.csv @@ -41767,8 +41767,8 @@ CVE-2010-0032,0,0,f33e62e0ac3fa2a4be37b89c6336efe5e50c4ff5182705e8986f120dd085b9 CVE-2010-0033,0,0,736b1ce485d5b658c4f2b6c9a0d1714e102758a9998f602e9c5a4f8a6a49dc5b,2018-10-12T21:56:20.897000 CVE-2010-0034,0,0,999cd1520bad4a588cf47388321d61270afbbdb4470179855b9d15b1ff82a293,2018-10-12T21:56:21.363000 CVE-2010-0035,0,0,ba6739b94a0114653055569d34811049abcd9cccdb27fc8801966bd93288698a,2019-04-30T14:27:13.913000 -CVE-2010-0036,0,0,e9ee063a25a722d5bdf63b5367403b4b6ae0e58625365f8ea34d13bdbc85be75,2017-08-17T01:31:51.803000 -CVE-2010-0037,0,0,4b34fb18421f9922054f1e6d2fbfe11b5a20d1575c98890d0212365f05f4427d,2017-08-17T01:31:51.850000 +CVE-2010-0036,0,1,6e11af69f2b941fcd9bd727a98386d71fc20114239c383bdaf096c469ebc777f,2024-10-15T20:35:00.990000 +CVE-2010-0037,0,1,43bf4d15f7ff0677247c4e18da2f9b290e869c69ccde209b0f104ac90ba01864,2024-10-15T21:35:00.707000 CVE-2010-0038,0,0,50209018c58345486ea87498d53157e2a15293721a30caa99c38e51c11b7ad75,2021-05-23T00:52:44.820000 CVE-2010-0039,0,0,924a43fae5ec24e53fc242e3987deb5434fae55cb5be9ed2b8685074bb4de917,2011-01-19T06:53:52.307000 CVE-2010-0040,0,0,c36a880f281e69cef1a6feaef836e0c37b0c0e492006c98adac4bb628b69386b,2017-09-19T01:30:11.267000 @@ -41778,8 +41778,8 @@ CVE-2010-0043,0,0,20c11ef87426a4bb4762aae6a34bd216567a7a2a8e803a68819433aa7b3896 CVE-2010-0044,0,0,36737b02e394b437636e8b591d2ffff33ff8a257515094847f1a1d0a4b831816,2017-09-19T01:30:11.517000 CVE-2010-0045,0,0,ccbdce1a5d60c3e022f19bc288a1dc292dc247c4586a07757cefae30602c86dc,2017-09-19T01:30:11.563000 CVE-2010-0046,0,0,4b36168aff4930aa8f4f485939f6fe586a30a18a2c55c94728272bb07621dcfb,2017-09-19T01:30:11.627000 -CVE-2010-0047,0,0,36e310e01a34f7b0d1f2db3c079298d53c25af0a0d5d915d77fe7b8eac327bf8,2017-09-19T01:30:11.703000 -CVE-2010-0048,0,0,400c5197cf78dbbd24531dd497c517c0595546a5b42b57324ca84980dc794ed9,2017-09-19T01:30:11.767000 +CVE-2010-0047,0,1,d5f8990a51a01175217e3cbf9f3deef0b4e98dc4bce42ff1d29cc5a88a13cfdf,2024-10-15T21:35:01.283000 +CVE-2010-0048,0,1,c59588f71acc525f5343f7f81baa0f8a558807fed45445f8e08bda0b8cfd7079,2024-10-15T21:35:01.767000 CVE-2010-0049,0,0,b7103c0c37998aaa6a54bcb453b609414b5ce6c69d2b9c077f5e2128c40fe868,2017-09-19T01:30:11.843000 CVE-2010-0050,0,0,94a3f91018d06d27dcc18f12c21da11a4514fddee8727ec778feae79b89ead5a,2024-02-03T02:24:33.537000 CVE-2010-0051,0,0,0e1a4ec64f24ec2abd3182be14fa8f173e0bfb6488ca495a553311405651faec,2017-09-19T01:30:11.970000 @@ -81627,7 +81627,7 @@ CVE-2015-8959,0,0,e4feb9cdabdb3d786b1dfa0918fb34a014335ebaac4e12d762b5ac36d6b511 CVE-2015-8960,0,0,7c8328ad312b06f04169804d632e57e483a9322217f8a9f4911101790603c6d9,2023-01-30T17:33:01.257000 CVE-2015-8961,0,0,62da8e87a5071d2e0f607fdea4425d342cf4861fe470d62253a06a5919c78788,2023-01-19T16:05:41.817000 CVE-2015-8962,0,0,f36c71c2820159522e0abec4e6fdf1c39415560ab75e38790961bd83bbffc9a1,2023-01-19T16:07:59.687000 -CVE-2015-8963,0,1,bf0436b5720895d64ce36ae64be1a69b016dfe1c2df3f7685d7f3d693926f78a,2024-10-15T19:35:01.347000 +CVE-2015-8963,0,0,bf0436b5720895d64ce36ae64be1a69b016dfe1c2df3f7685d7f3d693926f78a,2024-10-15T19:35:01.347000 CVE-2015-8964,0,0,7cdc86627e7edebae884be5734bc12c0bcc6e8c2d02f379240a1b96595c761c4,2016-11-28T19:50:55.427000 CVE-2015-8965,0,0,ad4c6458189f0cbc5fac9dbe6483fc48d3286626361bf61457c9f0b1be368572,2022-07-23T10:33:29.740000 CVE-2015-8966,0,0,5d536de20357e58f3a895a5fdc510fced6513d899ad14b0dbe3983c44800b897,2016-12-10T02:59:01.727000 @@ -89794,7 +89794,7 @@ CVE-2016-6813,0,0,d71885dff5c934e9fbe2ce0b6cf645d1395581af32a5df8b30eb53cb2de53e CVE-2016-6814,0,0,78d3f1533629bf03d80706ee5a160955afae71b11190e65cc31f959c3af7fe56,2020-07-15T03:15:16.327000 CVE-2016-6815,0,0,05dae4dce194b7cf3c6884df749bb6be9157d82b2de4c5b4c1a003f3c2269549,2017-11-03T16:02:16.803000 CVE-2016-6816,0,0,fdf8c17a5e83d2a7b9ead95cbb8569e4f3ea8dfd3627fff48a8e0b2beaa11c9c,2023-12-08T16:41:18.860000 -CVE-2016-6817,0,1,6383961d5d34661cbecfe77c3e7d44850098ca9acd0152fc0aa29fa181027f6e,2024-10-15T19:35:07.040000 +CVE-2016-6817,0,0,6383961d5d34661cbecfe77c3e7d44850098ca9acd0152fc0aa29fa181027f6e,2024-10-15T19:35:07.040000 CVE-2016-6818,0,0,19b81d454ed9c2f69424f0b7b67bb54c2f3a8ceea791ca333d5e075adafd3452,2018-12-10T19:29:18.343000 CVE-2016-6820,0,0,3f8c709c5d3168a806fa8d62e56db4812c1f7f337e47884702ba4bee5c134f3a,2017-11-16T02:29:02.160000 CVE-2016-6823,0,0,07dedf7f97839e34d5162811295dac0b5453bd99157789695e57347b86b73746,2021-04-28T16:32:48.120000 @@ -91632,7 +91632,7 @@ CVE-2016-8743,0,0,f0451111dce4bf6ecd69c3f737d2335d19cf4b10905c9e710f3d5b5d37e72a CVE-2016-8744,0,0,c6e5598d487c5114bd3cadfb7da34373326854657ae678e1ee186253346363e1,2023-11-07T02:36:29.397000 CVE-2016-8745,0,0,8ad2a0ef338b25421877c6b75cd276010266e3050fc96a80ecadc7ababa8815c,2023-12-08T16:41:18.860000 CVE-2016-8746,0,0,5889aac71000974612512cb0e6790af72bbb951d2106c5d46fe379aa79eb3b64,2017-06-19T17:46:50.020000 -CVE-2016-8747,0,1,be8ffe4c1b226b8a463e11b921000732c98b8c7264c7188f6ae715d1632edd17,2024-10-15T19:35:07.950000 +CVE-2016-8747,0,0,be8ffe4c1b226b8a463e11b921000732c98b8c7264c7188f6ae715d1632edd17,2024-10-15T19:35:07.950000 CVE-2016-8748,0,0,3e276dd3c6ef8a4d3797670441fb6ab06da8cb26204e2ef88c94024529e6f925,2019-05-01T20:20:17.510000 CVE-2016-8749,0,0,2d7fa202a1d154018945d0b067a6ee579cb8ac3812f0d9d03c9703e373477e0b,2023-11-07T02:36:29.720000 CVE-2016-8750,0,0,e6860de1e44e31a9f9b0d0d6a353c25e0db2660dee4f93c1a4df091975a410e5,2019-04-26T13:16:27.353000 @@ -92241,7 +92241,7 @@ CVE-2016-9424,0,0,c921bc0be77850a8673b84272f35fdb8c6408a687d5a0cbffb461b0f0c2119 CVE-2016-9425,0,0,21ac5ffb65fa37a4f19eaac2eb23ffe0d9ab387470b757bd0d450a7fed4ff11f,2023-12-29T18:38:04.570000 CVE-2016-9426,0,0,f90e06f00f1a284b5e29c6e47034aeb0af9e2c01e685adc120981e97d9654a0a,2023-12-29T18:38:04.570000 CVE-2016-9427,0,0,5f64bef16cd29b02a500713ca7667b8a7136594873543189f5b7225718ae73f9,2022-06-01T20:41:50.427000 -CVE-2016-9428,0,1,d4187b3909f84d3995ce136011fd4bc4d1bbc35e89f7f2438de4721ab814ebb5,2024-10-15T19:35:08.300000 +CVE-2016-9428,0,0,d4187b3909f84d3995ce136011fd4bc4d1bbc35e89f7f2438de4721ab814ebb5,2024-10-15T19:35:08.300000 CVE-2016-9429,0,0,3c897b808e6093d20e69e112f4c8b3c064c4cf0a878f14ca166d2d8c782ef0ef,2023-12-29T18:38:04.570000 CVE-2016-9430,0,0,b6a7947bb3a4718d0d1535ed5682928d4f28b19cc1ebc3dcc896b02d35f05be8,2023-12-29T18:38:04.570000 CVE-2016-9431,0,0,548d5a77e5dc17c6f5dd662f1ca70dbc4be0bb86e93dd475064ab480bf7e98a7,2023-12-29T18:38:04.570000 @@ -109302,7 +109302,7 @@ CVE-2017-9507,0,0,9c333ff0978324cbaa01461ac935e19a99476df62c1e87c106eec319f943a5 CVE-2017-9508,0,0,fd575a728495ddf07d36378bea37bce9e61fd2ca09088abdbc83aafcd024953d,2020-11-25T14:15:12.233000 CVE-2017-9509,0,0,1e89a7078ad4c967d194a45cd3d199039fae9bd181b6056ad8491751aea448cf,2018-01-31T02:29:02.170000 CVE-2017-9510,0,0,4bdf5637c21ad97bb78f02877bdd16340bf2cb8432c6f5f890cbb5bfe52be635,2020-11-25T14:15:12.623000 -CVE-2017-9511,0,0,1d14f5bacc227ba86fd1a364f43f6f69d583aff6b00f50f8a4ba7aa61be271a3,2020-11-25T14:15:12.733000 +CVE-2017-9511,0,1,86886d87c709fc55a181f2ed65e7cf65e96e51f2e7e37b90b5b6b8d148811b9b,2024-10-15T20:35:06.567000 CVE-2017-9512,0,0,6d23f4756d81961928025fc77d67c192f6323102f21199d6d8897e5c3906fb78,2020-11-25T14:15:12.997000 CVE-2017-9513,0,0,6995fad05e7e0cfe4cd854c103c35495b1db668b3ed5a14482f84849fe46a98e,2019-10-09T23:30:39.860000 CVE-2017-9514,0,0,8af9dcecfad72ac19be4a5ad46108f3350dd502ed166c178512e14dce5904b11,2019-10-03T00:03:26.223000 @@ -131856,7 +131856,7 @@ CVE-2019-13984,0,0,7f98f3a0004da7ed72b7ebdac0bbe0ff7cff78d899d1fe51a85bb1a7b6978 CVE-2019-13988,0,0,165406adc18203e69dbe506dde2e2eb543be8409e7529f8d48eb53010107166c,2023-01-05T18:16:09.947000 CVE-2019-13989,0,0,3b846a7077f2b9ed939690fa0a341892efaf331e91ecfc09cd8f096d32bb4fd8,2020-09-14T14:25:15.073000 CVE-2019-1399,0,0,2b4fe3f4727fbe5b64e872792fdc588887f75207e699599add36de26b4f8c94b,2019-11-13T19:16:17.557000 -CVE-2019-13990,0,1,156692f7736737b9e4694b16d30771e6ad9ceec5419aeb6a9d199f9c188a5afe,2024-10-15T19:35:09.210000 +CVE-2019-13990,0,0,156692f7736737b9e4694b16d30771e6ad9ceec5419aeb6a9d199f9c188a5afe,2024-10-15T19:35:09.210000 CVE-2019-13991,0,0,54dab28f5304ff5e608009a070d2c7aff7076150a2eae51bf736a966afa3d0fa,2020-08-24T17:37:01.140000 CVE-2019-13992,0,0,f2d3a4eb5b1a3a0c4f10e9d46c96061dbe6cab7e14ca22a23740339355ffd137,2020-09-11T13:12:49.640000 CVE-2019-13993,0,0,5e800f88a111fb74d20aa5625718fdd67e2461cea937d6feea60af587776a517,2023-11-07T03:04:32.543000 @@ -135243,7 +135243,7 @@ CVE-2019-17657,0,0,3589f959f4c5758fb254c32363b9c26f0e3bce3eb41bdf218b016eb517e32 CVE-2019-17658,0,0,e8c785ff740b98e11ca35218a2fb0941207707343437b70f43c39412099d6630,2021-04-29T15:57:36.170000 CVE-2019-1766,0,0,dd14365f2fcfad0166daa287f5cc5f8a0c81cbedb69e60f51d08209249804f2a,2023-03-24T18:04:42.353000 CVE-2019-17660,0,0,afffbe2474e3465c14e74b0749bae31435ebb7173be1f80009c8f6996eb6d753,2019-10-17T19:53:51.527000 -CVE-2019-17661,0,1,776bb5d3187d2aac10cb1d211a1359aabc2b0c7f10c6879082385e6ea3eeaa3a,2024-10-15T19:35:12.793000 +CVE-2019-17661,0,0,776bb5d3187d2aac10cb1d211a1359aabc2b0c7f10c6879082385e6ea3eeaa3a,2024-10-15T19:35:12.793000 CVE-2019-17662,0,0,94cdcefaea724ba3175dcd7ba3377f2df922b90ae348ba8a3a8b938b5dd04bdb,2020-08-24T17:37:01.140000 CVE-2019-17663,0,0,fa58fd6e8bdbcab57c2dc88ca55a0bd3744375f941ea98ef4cf360e747c8216e,2023-04-26T18:55:30.893000 CVE-2019-17664,0,0,fe0d4ccd4e4a22211f4362b1de9476d3a3121a1f9309ac1e8020a0fa1b3aba9f,2019-10-21T18:21:57.090000 @@ -135405,7 +135405,7 @@ CVE-2019-18275,0,0,57b69d578dae91260262ca2cd2de0532d239a1ae9a52c70553642ff54c959 CVE-2019-18276,0,0,b1c2c54bf8417368d5d5cbac5e1f69a50dc0eacfec4c242b5d5cba08dda15cb2,2023-11-07T03:06:25.300000 CVE-2019-18277,0,0,39618ab26b366044aec57d0ac909f5619853b7a5227e0faf0b837e53ef5f2b9e,2023-11-07T03:06:25.370000 CVE-2019-18278,0,0,0fbcfbebd244efebed557714951ceb122b2847400805fc63c53ce8ebada811da,2020-08-24T17:37:01.140000 -CVE-2019-18279,0,1,3af66cf0dc12aefd8f142e007bf0505d54b26886b291199538d45ec7714d1766,2024-10-15T19:35:14.120000 +CVE-2019-18279,0,0,3af66cf0dc12aefd8f142e007bf0505d54b26886b291199538d45ec7714d1766,2024-10-15T19:35:14.120000 CVE-2019-1828,0,0,31629b87d1faf7a4636e0b51380d1ea58a117646471ad0a46eb16e577153dc12,2019-10-09T23:48:16.300000 CVE-2019-18280,0,0,baa6ab0d6e8245dd1ba9d7a5a128d52d2cbf7bcfd025dc7cd74462e89fd76c91,2020-09-03T12:12:33.933000 CVE-2019-18281,0,0,b30c829839b001df0743fea21d37266d59016cc21077299059e47bfee868e6d1,2020-02-18T20:15:13.527000 @@ -156603,7 +156603,7 @@ CVE-2020-28044,0,0,9dec248224c84fb3b6d590d43e11c0b90ba0b86f61868c11bc93daa0f6964 CVE-2020-28045,0,0,4d5bdfbad3bc00d40489bccbd6fe76b89401563ec9e734cffe1b02141841fc85,2020-11-19T15:57:34.527000 CVE-2020-28046,0,0,44d530bddcaff80e6ff5be5fb1f549c7a3ec6e359dd3a9eb3d4698f0f2f81f38,2020-11-17T16:44:06.563000 CVE-2020-28047,0,0,595c4a35287db4d8495bb3fc1397c03ef462b6f15a9018a2b47a7fd9589ce955,2020-11-10T18:33:17.353000 -CVE-2020-28049,0,1,5198edddb89ec5d57d56adfc7db4108a9a566163236647b3915972ed2f1beebb,2024-10-15T18:35:01.473000 +CVE-2020-28049,0,0,5198edddb89ec5d57d56adfc7db4108a9a566163236647b3915972ed2f1beebb,2024-10-15T18:35:01.473000 CVE-2020-2805,0,0,56417af69fbdb9e62dc00ecf779e6ab849b2ad8db9062ed4b73b559e3c3874c8,2023-11-07T03:21:48.580000 CVE-2020-28050,0,0,98d0b33a06934e3e4b0d803cf9a2b485661d9ab4e64e6efc4c140b7a07fed853,2021-07-21T11:39:23.747000 CVE-2020-28052,0,0,7e307b15b15b3688430016c0e44640c2a415ca9ab47eae1c3388703b4ddeb8cb,2023-11-07T03:21:07.073000 @@ -158372,7 +158372,7 @@ CVE-2020-35658,0,0,bac6cf1c7aef565f1a1698a02251a8469c92fa52deab1b2d5ef8b5c883769 CVE-2020-35659,0,0,4441c1e1c8903144d64ad9be702d4ee0e77db6bbdf385bea53c34fd5963846e4,2020-12-28T17:40:47.570000 CVE-2020-3566,0,0,e1cfa7d5045a3d8ad006162cbffae3fab0acfa5538e71ade5e2b82f9f5feefb3,2024-07-26T19:55:20.327000 CVE-2020-35660,0,0,08a734959bf9e43b2dd6309403dbe1b952809996e47a441cf234ac58099c3bae,2021-04-19T19:19:32.800000 -CVE-2020-35662,0,1,08e139e9ffe01f10074da1797b766de8003e29d4961f1b3589bd33b9dc383741,2024-10-15T19:35:21.893000 +CVE-2020-35662,0,0,08e139e9ffe01f10074da1797b766de8003e29d4961f1b3589bd33b9dc383741,2024-10-15T19:35:21.893000 CVE-2020-35664,0,0,2cfbaaf1c74c1da117d4d6c1a5ecf1abc90b24b1bfdde941390c8b453f3729f8,2021-02-26T03:38:20.213000 CVE-2020-35665,0,0,b9efce5ee44d69e18b56c4b3437609d637cae01537a0e29baae259b6d4e59ef5,2023-06-12T07:15:15.967000 CVE-2020-35666,0,0,ba81c5a44fef70aa83376a2a240e5000e6c3bc1d26a02a5a987cff3f2ee8ba6f,2020-12-23T20:29:19.160000 @@ -160791,7 +160791,7 @@ CVE-2020-5525,0,0,64ea149f46db4ab00cbcbaf4a7491d0fb717f31ef584aba45673e2edd33e8d CVE-2020-5526,0,0,2391ec31a9c89f8c10917bf57865a3050800bba76fb45f94e58f50342e1c04dc,2020-02-10T17:18:20.030000 CVE-2020-5527,0,0,57deab79448e5d8a49b236a1811b92dfce87fc11de785b5c45af08454ff51018,2020-04-07T13:49:38.617000 CVE-2020-5528,0,0,09a1f1bcbb8bf8319db11603db57e44c757713209f0493810700709ca88c89a5,2020-02-07T19:41:25.013000 -CVE-2020-5529,0,1,010ee382d2cba73e8b4243c8f08192ed01682c1fbd6c1cdfd46e1de191b65925,2024-10-15T19:35:22.773000 +CVE-2020-5529,0,0,010ee382d2cba73e8b4243c8f08192ed01682c1fbd6c1cdfd46e1de191b65925,2024-10-15T19:35:22.773000 CVE-2020-5530,0,0,9f3a3ca2c9c8ce7035785f04c73f09960043cdfeb3136eff0c4b88086c8b5a7e,2020-02-19T14:25:37.707000 CVE-2020-5531,0,0,606ced651e1449d7c60ba7a6ae044659643c3b15529d957c79a7d7d8ddce2e4f,2020-03-04T18:34:01.613000 CVE-2020-5532,0,0,c141ef0177edc1068cb275042d6ac5224a6c000ad19d032ab8c08853e473327a,2020-02-25T17:52:00.583000 @@ -172960,7 +172960,7 @@ CVE-2021-28113,0,0,574b44645a729a2cfc0695972b78ca1a5bac176730befd5969281862c691a CVE-2021-28114,0,0,05ef0ec0c99eedc9271a931700ea3746450475fa66235fda50736febfd0e8a49,2022-09-23T16:51:39.850000 CVE-2021-28115,0,0,91e82c36cae7d5f3d74d62d7d8f6ff66a2ea3752505f53f54a34fbd4c9a458a3,2021-03-13T00:17:55.233000 CVE-2021-28116,0,0,af548a84a2f1e0902b418257ac708f44fa2e61c11f413f2ac30024bf58348873,2023-11-07T03:32:03.943000 -CVE-2021-28117,0,1,1053c6b1d303088252e7acc02380e7dd8095d5124cdfcd02be6fc0718e8146b5,2024-10-15T18:35:02.437000 +CVE-2021-28117,0,0,1053c6b1d303088252e7acc02380e7dd8095d5124cdfcd02be6fc0718e8146b5,2024-10-15T18:35:02.437000 CVE-2021-28119,0,0,b72f04a854999097edc8e43597b3e5bbc09d90dc38eea706ece37c3bbbef8a18,2021-03-18T15:23:23.303000 CVE-2021-28121,0,0,a7c57f54b35225b1286132ce4cb9b494f5fd721c4f4f715008a7b89e92edd473,2021-08-23T15:54:19.747000 CVE-2021-28122,0,0,ccc8c91f4ed32545ca3abef25c009df7f586fd35d6be52a88f14fb1f7de23a8a,2022-07-12T17:42:04.277000 @@ -175693,7 +175693,7 @@ CVE-2021-31795,0,0,9da81a6008f5aa5245d6879c7583a6aabf515f8c6315705249bc514edf7e8 CVE-2021-31796,0,0,ed36eef5be3d346955c0b0d40843393310fc9fdc8801fda2b5b5f0a90bfb1ca2,2022-07-12T17:42:04.277000 CVE-2021-31797,0,0,73f308ac067b28c164d692ead6dde7d33ce300ce77e48d13dfaba5526fb9bd0b,2023-08-08T14:22:24.967000 CVE-2021-31798,0,0,842b097bce2f7638ba8213a4d7f00b6c76e2adb192efc8fc0be9910d294150b1,2022-07-12T17:42:04.277000 -CVE-2021-31799,0,0,54e6ba73297ca204a474450dbaff97464337dd8f00fb73a58cb47c3a0418a9d9,2024-01-05T14:15:46.040000 +CVE-2021-31799,0,1,eb8e33159efeeadba92a68347c21c7c4bf9f627d7dc95a9d83565d6a7eeffbdf,2024-10-15T21:35:02.070000 CVE-2021-31800,0,0,bb17ab0c4ffa9705e23160fc918c86b180836c032950f94e0fc4202396cbc460,2023-11-07T03:35:00 CVE-2021-31802,0,0,b5e80e24ff59214bf9f094c27d8015472c24cc200ac80912e8e7d236bda6b0d3,2021-05-06T20:38:27.247000 CVE-2021-31803,0,0,493ea95999c39b12ad9906db142f6e8878efb7473fb287ea1a03fe1438330883,2021-05-06T20:40:00.917000 @@ -177807,7 +177807,7 @@ CVE-2021-34617,0,0,edc1a64cfeb4c0e2df32b7f7119695d9ef5fa9de6543b6f19ee12d81d14ea CVE-2021-34618,0,0,02a15b639d55b088d597f70410e6357bdac143aa1da1b22c1756034272dfd074,2021-07-29T15:17:34.050000 CVE-2021-34619,0,0,18a08322927fecc8a0a27e7875dbb1d65b52a60672691b7e4ef0bf33acdae6b6,2023-07-18T12:34:01.287000 CVE-2021-3462,0,0,d40fce269a120c19f17c82297a497adc608152420fd69d261c6bf6924a55bbe9,2022-10-27T12:45:23.963000 -CVE-2021-34620,0,1,ffaac1ce53a97c21b97c4f10941ff5ddfc251828ba52444f4474029615ab4dc0,2024-10-15T19:35:23.910000 +CVE-2021-34620,0,0,ffaac1ce53a97c21b97c4f10941ff5ddfc251828ba52444f4474029615ab4dc0,2024-10-15T19:35:23.910000 CVE-2021-34621,0,0,2907591a5a42bf6a0ded9aa9129b81888fa65f401aed577b6a84dd43e4c38456,2023-05-26T19:38:26.543000 CVE-2021-34622,0,0,e59444b71cedfed16528b7ab7b6850e6295a4f91f3538a5872e6f49f05b59443,2023-05-26T19:38:26.543000 CVE-2021-34623,0,0,92eeb117870210c18f20a043d5700b9eb85cf6960958c6019ccad808a21fa6b5,2023-05-26T19:38:26.543000 @@ -184188,7 +184188,7 @@ CVE-2021-43109,0,0,bf4b02900cfd9a8955bc08bfda6675045887f3d5c24a704f3816c990dec41 CVE-2021-4311,0,0,5362fcfaae04479060beb84a9eb18abc3b7be872203ecc3cc4a50d88dcaa16ac,2024-05-17T02:03:34.750000 CVE-2021-43110,0,0,65ea83f188f77e8c0dd8555adb4f9122953115591f199d20e981345b7abf42fe,2022-04-06T19:21:16.503000 CVE-2021-43113,0,0,9e6ad5610fd74098212979f2292098b6251d3ca8d4c5b6840bef938c1611808c,2023-03-24T22:15:06.940000 -CVE-2021-43114,0,0,549ca9846d88e2da25128daef83573874f1ba5c6a40b4f8f5fdee2801c52d9e3,2023-12-07T22:15:08.117000 +CVE-2021-43114,0,1,e9fbfbaca785cfe18c78817006d3d6c1b9309b7cc19552901693580ad8352dd0,2024-10-15T21:35:25.170000 CVE-2021-43116,0,0,acc34c3fe81927ac5ad3ae4216b07f6bf333836db17621c242b71e4f56c85cdb,2023-04-03T20:15:07.110000 CVE-2021-43117,0,0,f4999a6fb9c60ed7ab34395d45374e223008c982d1dc0de35b8c4f68f6493e93,2021-12-17T13:43:25.847000 CVE-2021-43118,0,0,85ad806e16c490812f2741bf30df49939796a021cddcc10ce37352abe7504fa5,2022-04-05T18:22:12.210000 @@ -192096,7 +192096,7 @@ CVE-2022-22813,0,0,49f441c695334d34a0db30cdf0e2e0672fd46877cda1538eb5e7a19a46b7d CVE-2022-22814,0,0,e856bdba1f8003659cf7ede0f38b014f9e6afe56b89c9498f092a14297b83427,2023-08-08T14:21:49.707000 CVE-2022-22815,0,0,601f13fcb22fcf437afdc6cf9525ec0e021463224352b9a66548fddf2019da4d,2023-01-31T17:27:36.360000 CVE-2022-22816,0,0,bddbd2dd9231bf62dc6487ce5b76dfa40f57b9536ed53951c45569311bda41bd,2023-01-31T17:41:46.750000 -CVE-2022-22817,0,0,5714d43f24239b64c77ba930f8d101a2ec9554e6cba8e29a61f25d0853a60639,2024-03-22T11:15:45.900000 +CVE-2022-22817,0,1,b535e4d77750b22ac71021c8d5f75d2fbe1b5579be34676d9292d8283ace293a,2024-10-15T21:35:25.423000 CVE-2022-22818,0,0,fcb4801446e307865385f3591eda474a2633609281fae2af3a31141cd8ce514b,2023-11-07T03:43:59.953000 CVE-2022-22819,0,0,c1c0b47b1fc4641da8427f41e08f6d1c6d6e41656a987bac42a91f4da094a628,2022-04-15T18:16:34.460000 CVE-2022-2282,0,0,72dcd95e1525c8f5ff5c618f33cfade4ccf6ce02d16a5b909b042f6e4c40611f,2023-11-07T03:46:24.137000 @@ -196522,7 +196522,7 @@ CVE-2022-28132,0,0,514c27b4a8ea5c0424943b0cfe173c5331618c82893416f2cf213bbfb8fac CVE-2022-28133,0,0,c75bcbb4c849156d4d399c0ecd88c51eb6d4670588507cd92fbb96c79c61c69e,2024-01-09T03:20:00.110000 CVE-2022-28134,0,0,bc2ace0342df28965d969cd8f2769ae710b40345f2a4b4dd18730e059150d945,2023-12-22T16:23:56.647000 CVE-2022-28135,0,0,b4b8f6f12226f9bd9abe358a3d75438cd874c7be98b2d4e7c66102fc4382734d,2023-12-21T21:53:55.317000 -CVE-2022-28136,0,1,1a0b4ad1d035316504d86e7a22fc1c81e85b0e0c0142d15cfee7ce0634b78ace,2024-10-15T19:35:24.497000 +CVE-2022-28136,0,0,1a0b4ad1d035316504d86e7a22fc1c81e85b0e0c0142d15cfee7ce0634b78ace,2024-10-15T19:35:24.497000 CVE-2022-28137,0,0,33a9664335a2d924ba0635bb5f72daca87f4c73942e79edf9e849e9bd56f675e,2023-12-22T16:23:08.167000 CVE-2022-28138,0,0,8cdd4c5723fac4c5f9bb47fc37ae9abbe7af931b3c675f2963405008d3549070,2023-11-17T17:23:52.757000 CVE-2022-28139,0,0,a042a4d027139319bb06a6a75fe1aa7c8c7543230ea7e0c449dfac57ac2ca2b1,2023-11-17T17:23:59.070000 @@ -198514,7 +198514,7 @@ CVE-2022-30547,0,0,e8e7999e7671db2ca6b11cbee96ecc0d751be3551ff3689647d6c2b4dc425 CVE-2022-30548,0,0,25c7729929701a7cea313660a9ebc63f574e751ed4ce69cffb4226d2a88a716d,2022-11-17T15:07:36.213000 CVE-2022-30549,0,0,d6f4715643e475f24cf06963d64cd280b9b9d15402b7e32afa657dc4b03e4654,2022-06-27T17:02:57.287000 CVE-2022-3055,0,0,edcbff647a85d58382d336223369defdde2ec6541033cbd064ab4ea17a088a2b,2023-11-07T03:50:44.703000 -CVE-2022-30550,0,1,e8d9d63be4799d75f05930c1889713150096dfa8257d34f771c89927ca440240,2024-10-15T19:35:25.430000 +CVE-2022-30550,0,0,e8d9d63be4799d75f05930c1889713150096dfa8257d34f771c89927ca440240,2024-10-15T19:35:25.430000 CVE-2022-30551,0,0,de75ae1b3ee244c0a837d095169a91ff22d949fb6636f64e09ecf57e2c678180,2022-06-01T19:59:36.657000 CVE-2022-30552,0,0,57b63fede45ced57b99e81b338930b2e7dd5f31bcbef5ccae577c540682ae0fc,2022-06-16T13:12:33.857000 CVE-2022-30556,0,0,8be0e914ba71b624e4617ee79d0dcf86767caa4b15efac3d0094b316b1e795de,2023-11-07T03:47:15.293000 @@ -208066,7 +208066,7 @@ CVE-2022-4271,0,0,a47ac03d1e87cb1cda38b7ea6127e82ceaa30264351edad1f0e8fca1e20900 CVE-2022-42710,0,0,2f897454383e292c38a2fea29c4b5822459c0c24a44f7454dc5f8ba6767830e7,2023-01-10T16:07:38.907000 CVE-2022-42711,0,0,5d6a8ca0f143e6cea55ae6ee10cd28d00a969dd3eac34fa6f3d8a6b06e9f46a1,2022-10-13T14:26:34.380000 CVE-2022-42715,0,0,ca40d0573c10bedd555693d4ffd55080465faa5da2e2b705115496faffca239f,2022-10-14T17:12:51.110000 -CVE-2022-42716,0,1,4705fba1711101272961c92c31f81ae01031bbc82880a8e937a9207b6a01fd52,2024-10-15T19:35:25.727000 +CVE-2022-42716,0,0,4705fba1711101272961c92c31f81ae01031bbc82880a8e937a9207b6a01fd52,2024-10-15T19:35:25.727000 CVE-2022-42717,0,0,e3bcfb08a93365d31eac7cf05e0f3cac57af88081b3bb0ff3d6786373b54159c,2023-08-08T14:21:49.707000 CVE-2022-42718,0,0,e7ef3cbe28d70c3eedc059ef27463f0cf13fb05f51fcfbce1be1f4bbc54dec0a,2022-12-06T15:41:52.600000 CVE-2022-42719,0,0,de7281539fa9a0fe0876114ee4b4db714a6d64cc5df275662cc25d2bb16cebcc,2023-11-07T03:53:24.857000 @@ -209735,7 +209735,7 @@ CVE-2022-45044,0,0,803554cd6e7551ef9fe93be947430fa642bd29a9865744e6bbe76fad2a5a9 CVE-2022-45045,0,0,0988c9110c5c33a2c170db03acf4107d6887428ae9710864a80db248253cac15,2022-12-06T15:50:37.127000 CVE-2022-45046,0,0,1de35eb14a19f7f6f23d1643119c63f0a7099d4349f88737629fa34915974228,2023-11-07T03:54:29.393000 CVE-2022-45047,0,0,8d0b7ebca38f0f1369d9ffdda0020ccf5de3b9a7e4f290085fa7a3e0d274f6f3,2024-02-16T13:15:09.513000 -CVE-2022-45048,0,1,d6b5e4e689837d594642e79790738cd8e0855bf21d6a43431c1e903e9fa71480,2024-10-15T19:35:26.733000 +CVE-2022-45048,0,0,d6b5e4e689837d594642e79790738cd8e0855bf21d6a43431c1e903e9fa71480,2024-10-15T19:35:26.733000 CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed2d3,2023-01-11T03:04:59.823000 CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000 CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000 @@ -209808,7 +209808,7 @@ CVE-2022-45129,0,0,e0ac11d7c2ca3a183286127657bef5780bebed5e7e26ad473712e63f12077 CVE-2022-4513,0,0,a623e2548c4d198cab3b5e24a7879401cd60e6db3e6750b2a35aac31b8b19e14,2023-11-07T03:58:02.317000 CVE-2022-45130,0,0,1be36ef4e68d679c4e5a26f49234d0e7be7af22ec7ccfe192333d6b33618ba9e,2022-11-15T18:18:08.173000 CVE-2022-45132,0,0,266cf6e7ca80af05fb82f59632edcd6ff3f2aaf2090d78f0714b9ce6c20da608,2023-11-07T03:54:36.650000 -CVE-2022-45135,0,1,cd1ebe0ecbe42047ad7d8664cb00d0b1d39df99583598f23d7f932ea73274403,2024-10-15T18:35:03.893000 +CVE-2022-45135,0,0,cd1ebe0ecbe42047ad7d8664cb00d0b1d39df99583598f23d7f932ea73274403,2024-10-15T18:35:03.893000 CVE-2022-45136,0,0,dd772858dd7886d445c3529154e08b61532301c2980961e154788a2b9cbdd8ce,2024-08-03T14:15:44.217000 CVE-2022-45137,0,0,73f176b2e87fd65174896043f76ee01f9aa425160bf34c9a021bd94852172979,2023-03-08T15:20:05.963000 CVE-2022-45138,0,0,56cdcb695833ac94db92e73442425c0756d3b4cb60ec5b71a9bd98ed7d826f47,2023-03-07T22:54:12.070000 @@ -220656,7 +220656,7 @@ CVE-2023-27526,0,0,90bba01935d8c50e0c427bc10053b381693c1dc56dd7a4e5673aca7143a7e CVE-2023-27527,0,0,51570319ea28f5ce4a1bb5e4f6c5711cb6c95ef9d30e45378de89d53283db5ef,2023-05-16T20:33:27.193000 CVE-2023-27529,0,0,6f2ed4737d00f1a28c49b76e39a9e2b76c4e559f222f4b425d71cb3e16dc39ef,2023-06-01T12:59:00.870000 CVE-2023-2753,0,0,3ec66932a5bcd9eed3481c511af0697f0ae6e6f569c9b289c3f6bd7b56f89f29,2023-05-24T15:18:44.767000 -CVE-2023-27530,0,1,a6b8da34011966b2aae235c9a5d48513cdef95567c0552e96e3b1236493190c0,2024-10-15T19:35:28.200000 +CVE-2023-27530,0,0,a6b8da34011966b2aae235c9a5d48513cdef95567c0552e96e3b1236493190c0,2024-10-15T19:35:28.200000 CVE-2023-27532,0,0,8fe400f7f37baab3522ba179b9f004b37bcc03ae2fe7be01437ae18da205a037,2024-05-09T18:37:54.573000 CVE-2023-27533,0,0,ddcf75098269ad247e88d3b9d3ae4eddf0ff197e2c39d7fccf88edcf619ac976,2024-03-27T14:54:51.937000 CVE-2023-27534,0,0,8799fd2c76e137ac497a9e25f1c9a67a6eeb13d9dac7a39ee061d3c5fdaf7a86,2024-03-27T14:54:34.810000 @@ -222048,7 +222048,7 @@ CVE-2023-29069,0,0,7da2f0cc934da7b46c3ba113612a21be795cffa5b852be9cd57cdb7ee23c9 CVE-2023-2907,0,0,7a8a7461df46bc3013396fb374fd593f3139f8b31f4f0f4d13e861e1c45881f5,2023-06-29T17:10:00.027000 CVE-2023-29073,0,0,09fa9364a43ad1600713f8328c4939940145a5a1646913c5041c0d723065d532,2023-11-30T02:20:48.793000 CVE-2023-29074,0,0,30e84416b576d09a4f949476dc99d16dc0944ed6f5c1e4eca872247afa8f398f,2023-11-30T02:20:40.343000 -CVE-2023-29075,0,1,51c3e8f462e6ab129d12634335476e6ee026ad8960305699dbe3f16ae63666fd,2024-10-15T18:35:05.263000 +CVE-2023-29075,0,0,51c3e8f462e6ab129d12634335476e6ee026ad8960305699dbe3f16ae63666fd,2024-10-15T18:35:05.263000 CVE-2023-29076,0,0,738196ea7eb05a83ccbf166531915bf6e3ecd99a353d13f5c275038287c98598,2023-11-30T02:19:53.027000 CVE-2023-29078,0,0,98f0a1df2914b755410c43b843273f3f9d7a3cbd24ceae31c365338749a6c3fd,2023-11-07T04:11:04.110000 CVE-2023-29079,0,0,edcf382a38e58cd59b2be67ba719f86a3e8b655dc0fc8f10eed674f74af76c31,2023-11-07T04:11:04.143000 @@ -223043,7 +223043,7 @@ CVE-2023-30570,0,0,32ae4e1289238527bea45856a5956c2666d0298df11b9014353bed6d1101f CVE-2023-30571,0,0,37bdef63b6140792b75b13cda177804470d747dbf58d1a00e95696797c0e43b8,2023-06-05T16:40:57.930000 CVE-2023-30575,0,0,453e9f14721a62fdcce101be7638faa38eafedbce10643f585d34009782ad1ce,2023-06-15T08:15:09.223000 CVE-2023-30576,0,0,a7beef98c4aaaa905d0d5c6034ba03cdb4e7ff8c323a7c6da61dd78d972b118d,2023-06-14T14:33:16.713000 -CVE-2023-30577,0,1,ca42116783f8ee4be277ed74592a45e2d496562e9eda457efa01613289b2a310,2024-10-15T19:35:29.413000 +CVE-2023-30577,0,0,ca42116783f8ee4be277ed74592a45e2d496562e9eda457efa01613289b2a310,2024-10-15T19:35:29.413000 CVE-2023-3058,0,0,9f7c305f8337fa20576361292d1d535cd2135f70c208fde6ed8bf974c1470dc5,2024-05-17T02:27:14.193000 CVE-2023-30581,0,0,b156a6b818374eedaecff7e6959cc25150181fbf1ed9a43d050cab8b1b8a4335,2023-12-11T20:49:02.543000 CVE-2023-30582,0,0,7764763ecd07c5fb15156b35aae4db9eecddd9d0dcb2778caae4e418824f86ee,2024-09-09T19:35:01.063000 @@ -223454,8 +223454,8 @@ CVE-2023-31034,0,0,5fa25a427ce0daa80d54b5d167ab61c466dff79ba4104f1a297cee7d9fb5a CVE-2023-31035,0,0,e432bc0ff52bd04f4a521ebde8a42030c8c5b1748e9d5899bfa694370648c5f6,2024-01-19T13:32:06.080000 CVE-2023-31036,0,0,dc0d629ead54f3cccdd9157c0a020d8f0e8e35cabf6fe29f2bbb8a2a304e0663,2024-01-18T20:45:53.087000 CVE-2023-31037,0,0,b95f45a927f3745dc380a7b2d93c3b4568522ef25775c003ae4515027e079ad5,2024-01-31T20:11:28.867000 -CVE-2023-31038,0,1,a278f0f2e81202889e90ede99a7d3e3084a9f40435a2a643087d642eb0cd9fdf,2024-10-15T19:35:30.310000 -CVE-2023-31039,0,1,b200f78e2a866a9e8f61c044755eeaa2e429914f488f494f2efaa15dd03a5b91,2024-10-15T19:35:30.543000 +CVE-2023-31038,0,0,a278f0f2e81202889e90ede99a7d3e3084a9f40435a2a643087d642eb0cd9fdf,2024-10-15T19:35:30.310000 +CVE-2023-31039,0,0,b200f78e2a866a9e8f61c044755eeaa2e429914f488f494f2efaa15dd03a5b91,2024-10-15T19:35:30.543000 CVE-2023-3104,0,0,8b6f4c6f48b1b62bf61458ce539caf79c30a1810a33592d01a47a4eba574dee9,2024-08-02T07:15:47.150000 CVE-2023-31041,0,0,d3f74113b8e24fb7c0c0ea099f9f16d14e383fd28713189dea1c7477de7e468c,2023-08-24T21:26:16.843000 CVE-2023-31042,0,0,e9e4089fb29b1dd553ccbf7459726b99b949b96ffd3c665020bf1be4ec17b111,2023-10-05T15:46:26.893000 @@ -224058,7 +224058,7 @@ CVE-2023-32003,0,0,61aa2cf05fc68219dcd3a0f1788eeefc22cd565c423346515dd9cef18f810 CVE-2023-32004,0,0,2f65f459b49d361d9730cc89e29c811cca8e3b0fbe8de40726919f20873ab2fa,2023-09-15T14:15:10.010000 CVE-2023-32005,0,0,932d47577f634f904c83223001a6f212bbb60744045087ba240044f21a08c88b,2023-12-22T17:07:29.110000 CVE-2023-32006,0,0,c8a5cb8ae876b507e0415003b3ecc178591f6426233c650a4050dca8bc183a38,2023-09-15T14:15:10.087000 -CVE-2023-32007,0,1,5c35865adee1fe07d55a3b831ef8dd5e1dbf9074f9e57414263b25f2b45df0a7,2024-10-15T18:35:05.553000 +CVE-2023-32007,0,0,5c35865adee1fe07d55a3b831ef8dd5e1dbf9074f9e57414263b25f2b45df0a7,2024-10-15T18:35:05.553000 CVE-2023-32008,0,0,1a7f71b8a1ea61d01db3f32a6c59f55cafb04a1e9f83c9cd16eb172ebe789ba6,2024-05-29T02:15:44.807000 CVE-2023-32009,0,0,473230b495c85d07b7366a260b477b20bb42c0c381cff45d66a58d8ba5bd2e80,2024-05-29T02:15:44.973000 CVE-2023-3201,0,0,05e9a1198820b29c4fcf047e63c08f3747e0e0f79b2b500047a90f12bcc8d461,2023-11-07T04:18:12.573000 @@ -227214,7 +227214,7 @@ CVE-2023-36183,0,0,54562b882596582c43463f5c4105d7c02e40d30428cf14d6280e6bdce32ba CVE-2023-36184,0,0,498fe11ffca9cf3bb428a3670da2c8bc5899a2de7f5c6c1fd2b917b8dac3d1b6,2023-11-07T04:16:24.190000 CVE-2023-36187,0,0,130002987340aaae852e57d0c6d11a41ac1a90b3fde98b515cdc68bc7a38df5a,2023-09-07T17:05:35.237000 CVE-2023-36188,0,0,54930d0be408cfd69be0eac3183f0b9049941734a2d1cb35388d8bd3b36faa63,2023-07-12T18:34:19.300000 -CVE-2023-36189,0,1,73a815f70f51c8046220523bcb04e8411ffedb80385a832e8de6f8d5211911a9,2024-10-15T19:35:31.520000 +CVE-2023-36189,0,0,73a815f70f51c8046220523bcb04e8411ffedb80385a832e8de6f8d5211911a9,2024-10-15T19:35:31.520000 CVE-2023-3619,0,0,9e5a6671ba246b70b4db8758cf5038a1eb286a0744b4ce51180ad578d887b078,2024-05-17T02:27:38.937000 CVE-2023-36191,0,0,00823ae71a62d0bb6e7f2fb1d27dd3732d8062dc7b6b9a8e738d16fe53c35c5c,2023-11-07T04:16:25.153000 CVE-2023-36192,0,0,1d8a5dccf4cade4ac929d84234ad33b0556786568b0a7035dab8871dacf1df3f,2023-06-30T16:41:14.160000 @@ -227948,7 +227948,7 @@ CVE-2023-3720,0,0,1ca03330ff4ebdad4c7a09ab89eb29f9b34da48545a17a2785bbb54a336312 CVE-2023-37200,0,0,3aad1ead99a8e32d973a13a68cd7a04a88370e22fdf2d9f697aaad7be108a68d,2023-07-20T00:35:09.917000 CVE-2023-37201,0,0,6b83bb2cc1f577d3379f8eb875e5ccd49e1a9788df963832fbf7a183ff01a483,2023-07-12T10:15:10.230000 CVE-2023-37202,0,0,2aa7aa02c0ba91581e181648a7bcc0c653a449039bd38fc23bedb8890c7ff74d,2023-07-12T10:15:10.350000 -CVE-2023-37203,0,1,fef459d54677bb7db18ed02ec063c82b5e687c75a9778c5b2bd9b24228fe38fc,2024-10-15T19:35:32.430000 +CVE-2023-37203,0,0,fef459d54677bb7db18ed02ec063c82b5e687c75a9778c5b2bd9b24228fe38fc,2024-10-15T19:35:32.430000 CVE-2023-37204,0,0,dd23e9c17c8f6babe82a859b37ccffe74e3eefe9ee11ef10d845e3965beda6cb,2024-01-07T11:15:12.120000 CVE-2023-37205,0,0,5d90666504e1d182da1091446956ac113a76c2b14b005aed016a92ea06683737,2024-01-07T11:15:12.190000 CVE-2023-37206,0,0,46342560d6b14d815fec53553b775166405fb0a3d0afbfdf0d75cb161aba0357,2024-01-07T11:15:12.283000 @@ -228991,7 +228991,7 @@ CVE-2023-38404,0,0,902ddf5ac3ca2946c3aa751a963d2fe56e9b643da3d7f28aa15700e00eda6 CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830ad9,2023-07-27T03:46:14.810000 CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000 CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 -CVE-2023-38408,0,1,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 +CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000 CVE-2023-38410,0,0,e9274a8c2977bf03cf0d0c7f2c3582424b089bd5b319bd6a98b407cf6ad77a9e,2023-08-01T19:54:15.847000 @@ -229009,7 +229009,7 @@ CVE-2023-38424,0,0,99fd4ff2cd45804a279009f8e79f45c2460852535d8a9d8c3b2de5ec9e04f CVE-2023-38425,0,0,be85cd1ba5ce4b3dab7a781196e893038fb93c2e7aabf5cf3e9b4428db2d2348,2023-08-03T13:52:43.773000 CVE-2023-38426,0,0,8be487c14d40f4026f898666c19e3292110c6d2186b99164ce31fa560af60242,2023-12-22T17:04:16.507000 CVE-2023-38427,0,0,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000 -CVE-2023-38428,0,1,375e75c46a43c6a3875664c4403ac19dd3e6d226b31ffaf168efc17a264f8616,2024-10-15T19:35:33.587000 +CVE-2023-38428,0,0,375e75c46a43c6a3875664c4403ac19dd3e6d226b31ffaf168efc17a264f8616,2024-10-15T19:35:33.587000 CVE-2023-38429,0,0,806bfaee2c26630261e30d4b617ecf5e71aca09cbfffc25cc02a6c4e45bafa10,2023-12-22T21:34:39.870000 CVE-2023-3843,0,0,f3768772f60b965aa9498137bd66ecdccef50ca14144b9e479bd7aa1ea659164,2024-05-17T02:27:52.767000 CVE-2023-38430,0,0,f3010dea503abff1cfd675939731309587295c43eef70a09f838c33e10b5b5d8,2024-06-18T15:10:09.290000 @@ -230179,7 +230179,7 @@ CVE-2023-39966,0,0,c5dd0a6aec9d4aa1d397a8d8e714a2e1c27d86c17c97f295844f17f70a93c CVE-2023-39967,0,0,ae0d31e50c7c32eb189851841b9266bdf847b57a25fec0aa33492f6d0fc62223,2023-09-13T12:42:37.057000 CVE-2023-39968,0,0,ba5ffd3a755e803553f689e664ca470d470bf2a69e684828049a9f7ea7ac01b6,2023-09-15T22:15:14.217000 CVE-2023-39969,0,0,3a6b8f892432a96e36442551910e26c57b3b61e40eccd9ab8dee84cd4502cc89,2023-08-16T17:12:53.300000 -CVE-2023-3997,0,1,91ca3eb1595160e2a5d694f6360ea70cb38146af23de50645318c5c37bddcf2d,2024-10-15T19:15:16.200000 +CVE-2023-3997,0,0,91ca3eb1595160e2a5d694f6360ea70cb38146af23de50645318c5c37bddcf2d,2024-10-15T19:15:16.200000 CVE-2023-39970,0,0,bb21001446f839220f5969dcda80be1e71b8e426712b7408673a0298889a4538,2023-08-23T17:39:56.180000 CVE-2023-39971,0,0,a947e48522049e989dfd2207442866b8db610de410f20becba059163cc4c0fb8,2023-12-02T01:15:08.287000 CVE-2023-39972,0,0,3be1a709c12904acde874dbe1827101e29037ae95c88070074639e37de5f5cce,2023-08-24T18:05:21.913000 @@ -234030,7 +234030,7 @@ CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 CVE-2023-45361,0,0,cbe1837117bae77cfa7c8113ef4bff14da0fe193bd049419020e7f971bbde8da,2024-10-10T12:51:56.987000 CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000 -CVE-2023-45363,0,1,355fc5f232bf1e41d622931e8e0fa5fff2ffd211e1fe3e75c8946b919ef7f3a9,2024-10-15T18:35:06.707000 +CVE-2023-45363,0,0,355fc5f232bf1e41d622931e8e0fa5fff2ffd211e1fe3e75c8946b919ef7f3a9,2024-10-15T18:35:06.707000 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000 CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000 @@ -234066,7 +234066,7 @@ CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319 CVE-2023-4544,0,0,66678644f5a46dafda162d852e01208919798bc2eea8520b8083f0782a62c9e6,2024-05-17T02:31:38.500000 CVE-2023-4545,0,0,5094a10071b5d5056e6f60e262b3febe432e4176bd6515e9eb7db9cc518aaf27,2024-05-17T02:31:38.600000 CVE-2023-4546,0,0,fb1125db61b39cbad44dc327e25d0286799298f14003739d8954476eaa2b4478,2024-05-17T02:31:38.700000 -CVE-2023-45463,0,1,9a78f4d0c8b60857252fea436d15ef84513884af739bee3fed98f637e0f511b0,2024-10-15T18:35:08.103000 +CVE-2023-45463,0,0,9a78f4d0c8b60857252fea436d15ef84513884af739bee3fed98f637e0f511b0,2024-10-15T18:35:08.103000 CVE-2023-45464,0,0,9884346d6a54efd33ad0403f2fae16c7bcf0ac34b9ae12386f58aef94fecf27d,2023-10-19T13:27:25.730000 CVE-2023-45465,0,0,11939030ce4eb60d36017d66f280d06015e01b5a936b89674c2cd009eaa75136,2023-10-19T13:18:38.903000 CVE-2023-45466,0,0,e19a332c24420755e29bdc00eb4f026cc2eead002eeae82e40fa92694ac9d222,2023-10-16T18:41:36.367000 @@ -234092,7 +234092,7 @@ CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000 CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000 CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000 -CVE-2023-45539,0,1,b9b4ee3af81befee503a260383b848c3b499e8e8720b40b3848220ebe0551075,2024-10-15T18:35:08.890000 +CVE-2023-45539,0,0,b9b4ee3af81befee503a260383b848c3b499e8e8720b40b3848220ebe0551075,2024-10-15T18:35:08.890000 CVE-2023-4554,0,0,cf6e0493fabcb0eae28fa5204b10744a5f3d57423632a868834aac6bfc68065b,2024-02-05T21:24:36.410000 CVE-2023-45540,0,0,f9fa54d48e396850cd644dcfc14b11c3a5b9baa24fe488931741460c67fc5d90,2023-10-20T16:39:15.033000 CVE-2023-45542,0,0,b9354eb52840255b735a9b8f8af4d37bbb9c5799afb10666e715844b295ab72c,2023-10-19T17:56:38.130000 @@ -234238,7 +234238,7 @@ CVE-2023-45703,0,0,070556f7cdea4e2addb11676672b324dd42d5030b84172af518bfffd1b6c3 CVE-2023-45705,0,0,d1579cdf15cf92ecd2427576da99f9ba06dccb4858fdaa9197aca556facb2f0b,2024-03-28T16:07:30.893000 CVE-2023-45706,0,0,d5dc82953bacdf7e8692c6cee3f5b9e98683974171515533c84fee346772acc6,2024-03-28T16:07:30.893000 CVE-2023-45707,0,0,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000 -CVE-2023-4571,0,1,8443fc50273dfda29496cebed5d56f9ac194ad2e3c5671055eb503b739aefb15,2024-10-15T19:15:16.617000 +CVE-2023-4571,0,0,8443fc50273dfda29496cebed5d56f9ac194ad2e3c5671055eb503b739aefb15,2024-10-15T19:15:16.617000 CVE-2023-45715,0,0,3278c072bd924465dfd9116ec5360f462dea3279fa22b565085ccb5501f7df77,2024-03-28T16:07:30.893000 CVE-2023-45716,0,0,db0d44612bd142c520992fd82eb862661776e524392c1075202fb819e27d77c1,2024-02-26T21:22:54.537000 CVE-2023-45718,0,0,503b94f26ece1372afe2befc1749228de6ec2a3a2f622ed4183f733f3d6e1b85,2024-09-05T13:14:01.253000 @@ -234307,7 +234307,7 @@ CVE-2023-45799,0,0,188b0f83d7878ae47b8098f969f768cf869e50e3dea08b261f247126db8b5 CVE-2023-4580,0,0,a57c3e7664e688b156820bd4b918e3f8486072b2b6add09845f38021feffdaf5,2023-09-14T03:53:15.150000 CVE-2023-45800,0,0,f496ca2530efaf7c1db1169c548eb0572c2c7fa0dc16de92c9d8b65231aa37ad,2023-12-15T18:50:06.017000 CVE-2023-45801,0,0,cf65d978a57bbdd5cf197844da19475d7658c7088a3bc16263e469fcf01449d6,2023-12-15T17:12:58.397000 -CVE-2023-45802,0,1,09b74e4a217ba14073d80c83bfe062d5ee5b7e02e2c72c2e4450da1fa0048906,2024-10-15T18:42:31.357000 +CVE-2023-45802,0,0,09b74e4a217ba14073d80c83bfe062d5ee5b7e02e2c72c2e4450da1fa0048906,2024-10-15T18:42:31.357000 CVE-2023-45803,0,0,23b8cbd7f626523fc6c08c975e564a6e86c86fc0e31e897720bf93e28c1eefe1,2023-11-03T22:15:11.693000 CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6f57,2023-11-07T04:21:48.277000 CVE-2023-45805,0,0,513f366112bde8fc8e42fbdfa66a39be7b5c9845822dfc13910fb1d740f25275,2023-10-28T03:24:28.190000 @@ -235186,7 +235186,7 @@ CVE-2023-46951,0,0,a2a1149009673701bfe93ebcee7c48a3a58110ed1168d2bfdf50f80a7f0c0 CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f796,2024-01-23T21:44:21.433000 CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000 CVE-2023-46954,0,0,027d3e8eb2a616e66ceedcb4a181a859da01b616cab639574d99af94762dbf8e,2024-09-06T17:35:01.953000 -CVE-2023-46956,0,1,2526c98583f5cb1d344e6399b829c1d7032935dea1897c631f9e7d92b2a01108,2024-10-15T18:35:09.673000 +CVE-2023-46956,0,0,2526c98583f5cb1d344e6399b829c1d7032935dea1897c631f9e7d92b2a01108,2024-10-15T18:35:09.673000 CVE-2023-46958,0,0,598349dfda94719665577de5fe0aa92d56da1b66528cb3b507f9540b0549c2e6,2024-09-06T14:35:08.110000 CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000 CVE-2023-46960,0,0,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000 @@ -236429,7 +236429,7 @@ CVE-2023-48651,0,0,3f057a7afdd285e7554b0b6c284d29d42d3ba941fa604744fc1323c88db54 CVE-2023-48652,0,0,30b28f5f6b93a46b2c1ce1f52cf168a633e5c34fa669bcb9ecb58b95d6522d89,2023-12-29T05:55:24.390000 CVE-2023-48653,0,0,4fb6e7a0b008e20f51ef4f63111fbf9fd0f0079e0ab2a1dc1103c7b617dc71ee,2024-02-29T13:49:47.277000 CVE-2023-48654,0,0,0b3b3102ce95f91c22905aa8f0c132cc56aba7398dff3c49066ba8dfc7f41451,2024-01-03T20:54:40.840000 -CVE-2023-48655,0,1,3aabd822ee44ed91334c6908392362a5f10f9c820ec96a8071366621f0e3c6b8,2024-10-15T18:35:10.453000 +CVE-2023-48655,0,0,3aabd822ee44ed91334c6908392362a5f10f9c820ec96a8071366621f0e3c6b8,2024-10-15T18:35:10.453000 CVE-2023-48656,0,0,4491ef8244b3a516fc90d018e6fde5397fdcf13d8bed3ec3a4791b68d1f4b1f8,2024-01-10T00:15:45.627000 CVE-2023-48657,0,0,4d5ad332b04fdd82aa860b75ce703a807f1db2387fc2d1d764cadab3e7a52a5c,2024-01-10T00:15:45.697000 CVE-2023-48658,0,0,e82fed3d9ed202c99ba234764f4a940d593822fcfe2e74b2ca4a927a3db4f761,2024-01-10T00:15:45.780000 @@ -236601,7 +236601,7 @@ CVE-2023-4884,0,0,cfbecc9b7cb6cbd0b4b1362ef48e959396e0c75ee9945389f4dfeb8d9f826a CVE-2023-48840,0,0,66507f89762cce8058d30fe903be3d25aa0326032ad749eddab90f58dfe5e1f6,2023-12-09T04:46:03.793000 CVE-2023-48841,0,0,a98679f76431dcf6326a4f8961979545584bd793a405fa03c3999d29af747aba,2024-10-09T15:35:09.740000 CVE-2023-48842,0,0,99ae820b733e6276d6aa35a1a60ab7d466debfd9a079b7690c967b25c7e87d0d,2023-12-06T18:54:07.467000 -CVE-2023-48848,0,1,e9dca9c0d63c1eb039bf47ed52632a0af1e0c2a089d537841789922521ea6ad0,2024-10-15T18:35:11.340000 +CVE-2023-48848,0,0,e9dca9c0d63c1eb039bf47ed52632a0af1e0c2a089d537841789922521ea6ad0,2024-10-15T18:35:11.340000 CVE-2023-48849,0,0,2253543c611d2e3acc680e128d1321413ba686970c36c4ae9ebbfec5b2a9273d,2023-12-11T16:18:06.687000 CVE-2023-4885,0,0,b2886bf75dd8aeea5a7e4b1b6590ad94e6642e0e312579090bc490039b601938,2023-10-05T00:57:17.943000 CVE-2023-48858,0,0,f7bef58909aa98ac653b8350d9c446ced9ed809586d0f82043ffb04744211c78,2024-01-24T20:16:53.197000 @@ -236630,7 +236630,7 @@ CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2 CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000 CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000 CVE-2023-4891,0,0,518501d9fad12c9ba0655a11e9a287ce14b36fbcb904c6e98df8ddbd16b3fc84,2023-11-16T18:01:59.767000 -CVE-2023-48910,0,1,059e3303b5f5870784eaca4274404a7f4379993c2d106b460273a0c44ee1022e,2024-10-15T18:35:12.120000 +CVE-2023-48910,0,0,059e3303b5f5870784eaca4274404a7f4379993c2d106b460273a0c44ee1022e,2024-10-15T18:35:12.120000 CVE-2023-48912,0,0,3e44b44d8c36623152dbf778c1bd6b4d6975114ac15e1ef6e92dfb4947cc5a99,2023-12-05T20:07:27.620000 CVE-2023-48913,0,0,3113a871c852c204f0705f6536a463b4b18ffc49c61dd56d51083e9768834811,2023-12-05T20:10:04.053000 CVE-2023-48914,0,0,f62ce7097dc2f1dc959323c678c29edb1633195083f560ff982632d82d4b0610,2023-12-05T20:08:48.207000 @@ -238959,7 +238959,7 @@ CVE-2023-52443,0,0,f9385f10015da6bf55bb8122c45f91dea08f0ebcf0b86dbba3be520b60745 CVE-2023-52444,0,0,ff1b66c08696a87218f77f485b37d3fc5299c10072e331232ecae65d40034d9f,2024-06-27T12:15:14.353000 CVE-2023-52445,0,0,80c0900b453167fa4727f58c1d6ed4703571bced9efcfb2a098c7c8ace7d4eb1,2024-06-27T12:15:14.443000 CVE-2023-52446,0,0,3c43f37bfbe77d44aac5b39332a9d6c446bdee43d4bb4ae75b9648c956ec7419,2024-03-14T19:47:14.733000 -CVE-2023-52447,0,0,32fba17c46d04f58670827a3d1aa85cb25ce2d6a96f6eb7326b3ae621aacfbae,2024-10-07T17:46:20.457000 +CVE-2023-52447,0,1,77c499bff75af2366da5219539beb323be4adce3bb874c4b4cac44abbf155de8,2024-10-15T21:35:27.043000 CVE-2023-52448,0,0,fedc172ca4f5dd200a74e4bd94ad76ff0d3f2d90d7689f69766e034a3e675e28,2024-06-25T21:15:52.380000 CVE-2023-52449,0,0,4d1f6cd2982acca76b93ec941bd286aed5948f8f276db6f7a77d13fe919e3de8,2024-06-27T12:15:14.537000 CVE-2023-5245,0,0,3d86bb7f490d286fc064a148587238b5a31e42e8e43a723602346c5d74da9ed1,2023-11-22T22:39:07.763000 @@ -242965,7 +242965,7 @@ CVE-2024-1869,0,0,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a61 CVE-2024-1870,0,0,9043a976525f352aaa6c3d9729ba890eb6378250a18455d48857378e562c62f9,2024-03-11T01:32:29.610000 CVE-2024-1871,0,0,3febb3fff07b16e51c21f3b87748727e6cb83597ff7d412acb640471d56a308d,2024-05-17T02:35:39.620000 CVE-2024-1872,0,0,aa7a68ee0f5f23cfde15f81a4ee68e0aba9fc68928dc131f7d1904269d9689ce,2024-03-29T12:45:02.937000 -CVE-2024-1873,0,1,48ba33ce47bb197174bf426612a0767c59b5459a927dfd6b91332949526c3c92,2024-10-15T19:14:09.547000 +CVE-2024-1873,0,0,48ba33ce47bb197174bf426612a0767c59b5459a927dfd6b91332949526c3c92,2024-10-15T19:14:09.547000 CVE-2024-1874,0,0,b3d82a78aae87d3aff2d8730cda3de5c4eb1ff6a7a168fbf4393adaad2eb2b3f,2024-06-13T04:15:16.157000 CVE-2024-1875,0,0,a69a70937681edd3d5184a4fd13b8b71713c44ac42ff9a8634ede759dab371d6,2024-05-17T02:35:39.780000 CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf7847,2024-05-17T02:35:39.867000 @@ -243977,6 +243977,7 @@ CVE-2024-21169,0,0,75cfaa7dbb3017d69d1c32e7c9a3a07923f1edef87ef625d3961fd8622ff3 CVE-2024-2117,0,0,79d7dda411024d417201240caa69efdac6b41c6c0da01c1949cb476b1159e785,2024-04-10T13:23:38.787000 CVE-2024-21170,0,0,c5187e657a00f549910e595ece74fe4bb94a48a7327eb2a07a05c5358de9a8fa,2024-07-17T13:34:20.520000 CVE-2024-21171,0,0,2fd05d07a23e14dbd131721fe68544117ce9a854c5a28a6e860a4826c9defab4,2024-09-12T20:42:17.600000 +CVE-2024-21172,1,1,546a31cdcdac890d42b42353e261ce417348f1608343ed99ec40991c0dc3be5a,2024-10-15T20:15:05.770000 CVE-2024-21173,0,0,0ea475d867b4d4f1362920523704db449c8b286d1da5d834bf41990aed42cf2a,2024-07-17T13:34:20.520000 CVE-2024-21174,0,0,ba6844261aa04c1ce6ded1964dc44516b30559a14a2b47a862fad5fb6e961d86,2024-07-17T13:34:20.520000 CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 @@ -243993,15 +243994,99 @@ CVE-2024-21184,0,0,37cd37fb545516fbb59fd1ba869a88e708c94a5eeb702cc6c468d416d7511 CVE-2024-21185,0,0,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000 CVE-2024-21188,0,0,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000 CVE-2024-2119,0,0,11b037b49d290ba489439edd17815bf1f5dbc31c03ff8b80541b76c9d70af605,2024-05-22T12:46:53.887000 +CVE-2024-21190,1,1,435bb6184b96c547434e5c338e207c317aaa758c87df1f831ca519d2f05ec447,2024-10-15T20:15:05.973000 +CVE-2024-21191,1,1,884d56bc23a6d5df4d9ee4ab361a59f6cbe0a8fee82e9278f7a980055b8b8d29,2024-10-15T20:15:06.150000 +CVE-2024-21192,1,1,f240a8e8dd949bb1463062e55c912df070ae574b6f18f8076ed19db85dda7991,2024-10-15T20:15:06.340000 +CVE-2024-21193,1,1,fb74e40ff11bcef180cb8eb2355b58b85fe814ba324b4e3478606e25dd15df5f,2024-10-15T20:15:06.533000 +CVE-2024-21194,1,1,ddb74bd46e703e2269d45d687c595afe0d0646da656f07f0781b78cf52c0d53e,2024-10-15T20:15:06.733000 +CVE-2024-21195,1,1,d06c0a82be155206ee8865e8c7608838a0fc82f68fe94703d3ea7270d878b102,2024-10-15T20:15:06.930000 +CVE-2024-21196,1,1,bd5697a8dcac1345f742c7a9636ddef35566937d59136113dcf2528921b3aff9,2024-10-15T20:15:07.113000 +CVE-2024-21197,1,1,f155cd736816b97ce13b96c6425f2faf22f6c8e00eead1f347cfc8af4362038d,2024-10-15T20:15:07.307000 +CVE-2024-21198,1,1,11269df0309751fcb350be1bfa9fa62f3c0227b76e41e91433a0aec3da86eb97,2024-10-15T20:15:07.503000 +CVE-2024-21199,1,1,09aee11ed9b225d95c3def4ac3e3d5d302331a7884a6596bd496dfe75a6fad9d,2024-10-15T20:15:07.707000 CVE-2024-2120,0,0,6b5464bebd26aefe39617ee608f8869264c47eca6efc9fe45d62e273fef6e20b,2024-03-27T12:29:30.307000 +CVE-2024-21200,1,1,8b5ed86cd56a8c2c9bcbf959c9b6e13c3b95c0c677fdb62252eb439b53bfde35,2024-10-15T20:15:07.910000 +CVE-2024-21201,1,1,5f5f3246da4979cf72c7b87a093769bf0a84c00de37b3299fa9630c32d0d0f7a,2024-10-15T20:15:08.130000 +CVE-2024-21202,1,1,1e7b3c303b64d1e3aab44eed3044a8d3149e336c070bbb46f75a8ea90634e5df,2024-10-15T20:15:08.310000 +CVE-2024-21203,1,1,1f74651b6c89dd9e9684b887abe795b6e1f89c7fbbf1c1a1099db2e17c241d1b,2024-10-15T20:15:08.490000 +CVE-2024-21204,1,1,5ed9fe5fe92b259a5d8aa323d621dc35e7edeb4de3be6bf9ad75acf0cf92776a,2024-10-15T20:15:08.673000 +CVE-2024-21205,1,1,9bf16b88e0205bb2931e7b7594a574555d526e6d2c977fa2d90ce93444a19602,2024-10-15T20:15:08.857000 +CVE-2024-21206,1,1,a22ba493b7dccb94d2f2d3f3e925ba04c7fd941920d41a71ea2fc785379cb49a,2024-10-15T20:15:09.050000 +CVE-2024-21207,1,1,a0d8718bf63b8a62139f278f52a4a9f0d56eb033c30bc5c16680d9a9b6ba24ed,2024-10-15T20:15:09.243000 +CVE-2024-21208,1,1,c3b7267c333dd81692beaddd298b04905d8304d112327e34aa8e7d217f43a29f,2024-10-15T20:15:09.437000 +CVE-2024-21209,1,1,945ee2d52843b58c1b5949653e8fe84b096668917b5dbe4100a02bed041ebf66,2024-10-15T20:15:09.640000 CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000 +CVE-2024-21210,1,1,b035053249dd2595c187a10b56ea924fe9742bee1125093c760a2c9e27f3756f,2024-10-15T20:15:09.843000 +CVE-2024-21211,1,1,c3e5724801b96344e80207da74b416cb0478d9a636c514bab3d02bd7b67b1c48,2024-10-15T20:15:10.050000 +CVE-2024-21212,1,1,9e559055f647e63d34a529112ec23c614c1b41c292339c5c3423fb6c7ead746f,2024-10-15T20:15:10.237000 +CVE-2024-21213,1,1,40ce67d90357f17fe1bc8536f879287157c9195d06abfd968b1ad484739fb1c9,2024-10-15T20:15:10.417000 +CVE-2024-21214,1,1,43772afaa91f4a4b1c995f4cb898690412d84efb89ff3ab56898fb41a2bee202,2024-10-15T20:15:10.607000 +CVE-2024-21215,1,1,bbe145539d9dd8a7a567fbeb127131b0653facfcd13b3acf40c02b9e7104f935,2024-10-15T20:15:10.797000 +CVE-2024-21216,1,1,ac3eafba9ac54c4709f2b18f56e672feea52514c5c214f5af850a287740767c6,2024-10-15T20:15:10.997000 +CVE-2024-21217,1,1,3abba85826fe5471effa4bcabbd5918f441c7d62e0027b8fdb159f1b632a013e,2024-10-15T20:15:11.197000 +CVE-2024-21218,1,1,725a70d4b6fae57868d1ef1c658ba04f1b56b55fc711428ba6d029cc8674334e,2024-10-15T20:15:11.387000 +CVE-2024-21219,1,1,9c6d42eaab4758a219418fd7d7158287a281b77ebc224cc787fd639ad208ceac,2024-10-15T20:15:11.573000 CVE-2024-2122,0,0,6adb417d17977398c135497f29387af3778b2599a16ab5e9bd8471296ff409da,2024-08-02T17:25:13.067000 CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d74,2024-03-13T12:33:51.697000 +CVE-2024-21230,1,1,361c5dfdb538a25b14bfc0b629800e415a40783fa94df5046207dd72cbd0c329,2024-10-15T20:15:11.757000 +CVE-2024-21231,1,1,18a597b1a8dae3016f076ad403f05edeefc1a49d8a58a9753b89fbb3d3f7d933,2024-10-15T20:15:11.943000 +CVE-2024-21232,1,1,1c04a08d856e1766ea896853699e2d8cdc8a0e750a614c63ade790fe4733fd75,2024-10-15T20:15:12.120000 +CVE-2024-21233,1,1,cf52018614d5af146dc756d483892b03dca649064e261829c885ac98a5371673,2024-10-15T20:15:12.293000 +CVE-2024-21234,1,1,7e4339d0c27bf4ec1fb4f5eedc66e7239417c431781bc6ec8fe0b8d88c4a2540,2024-10-15T20:15:12.477000 +CVE-2024-21235,1,1,ae084464667f69d85ca63ef062c22ecab79ed85cbd52935510909a7185e97eb4,2024-10-15T20:15:12.643000 +CVE-2024-21236,1,1,bcaf4554b502b0b5b13af858a828c7fdb62dad8b0f049fec918c61a2eac3b16f,2024-10-15T20:15:12.810000 +CVE-2024-21237,1,1,faaef87e871d2233f6d98ad59023cd253b8773ca46a70e2b9155b3f4ccb40225,2024-10-15T20:15:12.983000 +CVE-2024-21238,1,1,7312612a95b0d8532ecf3b2625b46fe4e83e3c374e39da8f4c707d26a4a9dbfb,2024-10-15T20:15:13.160000 +CVE-2024-21239,1,1,c9d0b98bd9c3269775961fbaedcec4a6142159aa8acd48fa7a8f1a5ac84ff515,2024-10-15T20:15:13.350000 CVE-2024-2124,0,0,49dc310dcf10d520f5d59cd2423bf19b84e2577ed2ccf7fa71616fe601b6b6e0,2024-03-20T13:00:16.367000 +CVE-2024-21241,1,1,5e7a3c1e47dffce16aebf1959053000a9550ca27a58e8b08876ca06ccfc31ec6,2024-10-15T20:15:13.547000 +CVE-2024-21242,1,1,62a61d504dafaef0fa9ff45a9381608a0dd9b4bb8c1f3bef253428108c0b55f8,2024-10-15T20:15:13.730000 +CVE-2024-21243,1,1,4171963893ea28d06a840d61118ed80c0c9cd8ba0d7317aa61c48b7a6c316527,2024-10-15T20:15:13.923000 +CVE-2024-21244,1,1,fc34f7e2e3e45ac5ca72fe9da19df136c4b3c7cab0ef42bdb034aa981cc32b45,2024-10-15T20:15:14.130000 +CVE-2024-21246,1,1,1deb0c63d471515cc2ddd39de4ef08717d608b4692a5508abe0445f8c0aa84ec,2024-10-15T20:15:14.327000 +CVE-2024-21247,1,1,146d29f1674f4226c7c4e16e454e790bfba13b8d047644fc5b08305efc4ff9ef,2024-10-15T20:15:14.513000 +CVE-2024-21248,1,1,cf534174514553781aa90d00f5512d657044c1441ad9d37c20d389c97f81baa9,2024-10-15T20:15:14.707000 +CVE-2024-21249,1,1,69640830ecebbe6174fb1f3e652661c31c47c143fe1aa9c8fd638a88b529bb01,2024-10-15T20:15:14.880000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 +CVE-2024-21250,1,1,45b0c9a94755c70d9bb0ae25838ab87a1e599ad0eac1e6990149766b6ed24cda,2024-10-15T20:15:15.063000 +CVE-2024-21251,1,1,314876e16f1d24d683b41f84aa5c9ddcfe0dc328bdbd2dfc3fce5b5f6607d765,2024-10-15T20:15:15.257000 +CVE-2024-21252,1,1,b6133ca0fb82b0aa651c5d4d71daf0aec089dc8842f6e59c2d0b1f22e4a95192,2024-10-15T20:15:15.450000 +CVE-2024-21253,1,1,42535f4c287e67a28a65451bbeef8eb7dd78d47d09398c95f842cb9658f40f20,2024-10-15T20:15:15.643000 +CVE-2024-21254,1,1,cd2913aaa8aee4ad5eccfc47b514b300ea2849b7dc85ed7b0279effcdb0d1ff3,2024-10-15T20:15:15.853000 +CVE-2024-21255,1,1,a39973ac513195c68de6cce7f6f30a80736ff3fbaecdcc6886dc2dbca889d6e9,2024-10-15T20:15:16.040000 +CVE-2024-21257,1,1,8e7727d500cb637d646e4dbd453d6b3f7360249a8f9b56ba6fd24dfe0ff76408,2024-10-15T20:15:16.220000 +CVE-2024-21258,1,1,e69c667f399872c54018f1694cfb6b3fc98d74ebac96037f7e5b288ba1efa95e,2024-10-15T20:15:16.410000 +CVE-2024-21259,1,1,9414436aa001440dbb70ebc4ed88ea82174570306d0e93b9c729da743359d81f,2024-10-15T20:15:16.590000 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 +CVE-2024-21260,1,1,72438adb2d0c804453cac2dcc04e275cb93495a96219636d41d83bfc63a11bd7,2024-10-15T20:15:16.777000 +CVE-2024-21261,1,1,f699605c630138a5c5a94a864d112e5cf32d36612853d753eff50cc016f016d1,2024-10-15T20:15:16.960000 +CVE-2024-21262,1,1,7d22323d4195a649f78ac9c2f252047e25e599d950f83b6a6687af8f792f6544,2024-10-15T20:15:17.157000 +CVE-2024-21263,1,1,b81734807fafd89f08cdfe5bf71ce9461b8952c3037628d6d663a93477ecccd1,2024-10-15T20:15:17.340000 +CVE-2024-21264,1,1,158bd967d3d4b3fdd08b78ab8343c5d51973598d9242e515e4e991d294376c9f,2024-10-15T20:15:17.533000 +CVE-2024-21265,1,1,307c301d8f33f4bc1427d3ee47f15cd71ef61e053d6391b446cd583eb193d739,2024-10-15T20:15:17.713000 +CVE-2024-21266,1,1,321348ac35f7268b3ce2d55d3808f0ee4ea86852878f18ca281f3d2fafc567e0,2024-10-15T20:15:17.910000 +CVE-2024-21267,1,1,27bbc36a45b7a7056f2b5430ab58acc19380c3cf205525fd7db459ea808b5c32,2024-10-15T20:15:18.090000 +CVE-2024-21268,1,1,336fe50d9477a65798d38b399335d059522b193a801186fa750a8973792ed472,2024-10-15T20:15:18.267000 +CVE-2024-21269,1,1,2e18b79381e74475e1d71ec27f0d493ae80fa303c98b5b73594b1c7b7f1a62e6,2024-10-15T20:15:18.437000 CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73db,2024-03-08T14:02:57.420000 +CVE-2024-21270,1,1,d025fc5fb4c774e200db890aa5e8f9bc095c63e278504d3672bfc76a0b446edc,2024-10-15T20:15:18.610000 +CVE-2024-21271,1,1,b85d49d8f9de00c029cd3202996b9b057d499d9f44df9f57d9687a0a9038b029,2024-10-15T20:15:18.787000 +CVE-2024-21272,1,1,c149d420ee7f3d8baef5e75358728372978558e6fb033c09a3d5d75f23e8c02f,2024-10-15T20:15:18.963000 +CVE-2024-21273,1,1,04496095cb8b4aaa02970f47691658c4e2810952d7922253a3c38fafccc67088,2024-10-15T20:15:19.140000 +CVE-2024-21274,1,1,62a4b2b2e4c942516aad07bf7b07a150c0cce85637c2314b2e9cae729fe68350,2024-10-15T20:15:19.337000 +CVE-2024-21275,1,1,9ac442b83bc76b33b97423f50a157feb71a57aaeab033d0425baf33bca141d17,2024-10-15T20:15:19.520000 +CVE-2024-21276,1,1,8b2e9dbea7c99f0352b879542cd7d6d596983367311080e1317c85bda0aed585,2024-10-15T20:15:19.693000 +CVE-2024-21277,1,1,54ab876c4f8819b924d7a9c350072661eebd7db688393f66ce0086f97eaba47a,2024-10-15T20:15:19.873000 +CVE-2024-21278,1,1,d261571bc21e7b24546c6eb985b5cec06ad969f63a7ad6226231b34a83dab079,2024-10-15T20:15:20.070000 +CVE-2024-21279,1,1,3e7adb5fe98d4b5082db41ab7cd3900f868f6081be8e8d58c5cb26a5b4890179,2024-10-15T20:15:20.257000 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 +CVE-2024-21280,1,1,b9554b7f7abb5affb1a096cad9b1fe0c2617cd7f6ed2367020684bb93aac3722,2024-10-15T20:15:20.453000 +CVE-2024-21281,1,1,abd90711b9e3f325b6d42ab1c1b705637faf2e7592da235589e5a67236b03492,2024-10-15T20:15:20.647000 +CVE-2024-21282,1,1,7bca1b68d9075b78aaa48372eb02cbcefe62111f1ddb6788b8fb49ed20a2cab7,2024-10-15T20:15:20.830000 +CVE-2024-21283,1,1,560f606add69d81757d21e3e725928f10c193e367cc9a99c78dc3e316f29f4b3,2024-10-15T20:15:21.033000 +CVE-2024-21284,1,1,922679c8d9d0a503132962d0fa164a75313d070777c608522787df7903274f6e,2024-10-15T20:15:21.257000 +CVE-2024-21285,1,1,6177be495a9a6b83df6bc5fa0b039271fa60b0f0bb27b54e9da5f3a9ec1b8e60,2024-10-15T20:15:21.447000 +CVE-2024-21286,1,1,f676d04af19b6d55ddd1c28fa634d74f401a14e997eff992c2adadb09f67731f,2024-10-15T20:15:21.633000 CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000 @@ -244860,7 +244945,7 @@ CVE-2024-22318,0,0,23961be1d55db1add7e5c07e52a10b572ea2445d12113c47c48e0f1ac8215 CVE-2024-22319,0,0,ea19cdf9e4072a8b9cfc9502b925f062e7b8a96ab088ba79c4019077bc3c20e6,2024-03-21T02:52:02.483000 CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9d6,2024-08-07T14:35:01.727000 CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000 -CVE-2024-22326,0,1,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000 +CVE-2024-22326,0,0,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000 CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000 CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e28989d,2024-04-17T12:48:07.510000 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 @@ -245010,8 +245095,8 @@ CVE-2024-22519,0,0,3e82e80c8979a8ae5042490d08d01b21bbb5d33aa5bea2753e8328a66ce7b CVE-2024-2252,0,0,c849364a795ce51dde181f33a6ec30b001d5bdfe5ebad19fe6de9bde29e509e7,2024-03-13T18:15:58.530000 CVE-2024-22520,0,0,57a4a0e95e01ac29a1644bc8dd95e1182aab0ee098645584e77b48608e2ef25f,2024-02-14T19:45:35.337000 CVE-2024-22523,0,0,4d1bedf12f65c21e553a2d1d3b166e89d2d1d69d220c5bbcba3c4d692b00d258,2024-02-05T18:45:22.323000 -CVE-2024-22524,0,0,c687ab2192652ce70e04de4ff70b5d388ad0e3c8527a706745b3a74687bdf98c,2024-06-07T14:56:05.647000 -CVE-2024-22525,0,0,67ade60009abd3eeebfbf6ba3b580fdcbfe57dc1028ca6bbfd14f30c5d89667f,2024-06-07T14:56:05.647000 +CVE-2024-22524,0,1,ab2cdf019dd6c1da16c352738080a65ad88b074a9cf957a8b3e123f9ca828169,2024-10-15T20:41:01.773000 +CVE-2024-22525,0,1,1a5690a22b6c338f7360e479d85cb27bc0ae0b34f0612e2bb4f2c7ef138f544c,2024-10-15T20:37:23.253000 CVE-2024-22526,0,0,218c7b0985406f5be9160a4eba34edfa9ea3d3e7eea50564dba9ab623f1f5014,2024-04-12T12:43:46.210000 CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba76ad,2024-01-31T18:42:44.573000 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 @@ -245155,7 +245240,7 @@ CVE-2024-22871,0,0,63ab5ea037d8258d975db22f8b209c07fd620fb9776c3d0a9a24c80139462 CVE-2024-22873,0,0,3e804664cc070ce55555c4a054f46b8aa2f31d8d94dcc162e42607997d87baae,2024-08-05T21:35:03.423000 CVE-2024-22876,0,0,2b681eac932c151f8b6d70661e354dac90a6846621aa7fbcc62aabd644cf5d8a,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,240f9475c4adad9f666e1dfbbc8f3731afeed11d7d0ecb60814db8666105f3c3,2024-01-25T17:45:50.770000 -CVE-2024-2288,0,0,b4cf18d6ba32e4c36db7cf08af926b27a55ae2af26e8cbac63e8073de65ba6a9,2024-06-07T14:56:05.647000 +CVE-2024-2288,0,1,44a5855956b2fb35334f494e61358fff44a28f989d0dcfad2afaa8242c6c8696,2024-10-15T20:31:45.067000 CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000 CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000 @@ -246479,9 +246564,9 @@ CVE-2024-24875,0,0,d4175d9d145d2e6aa042e46e11e97f48819e638c38138d0ec209148e9f744 CVE-2024-24876,0,0,fd2b02565d60f44ad7f12138fcc8688af9116be3df3cfc2409498788186c00a9,2024-02-22T19:07:27.197000 CVE-2024-24877,0,0,9d2f0e7fc46543edf49748fb4f8f8be67b4fb86dc6a0325358bf368765aade7c,2024-02-15T02:53:41.823000 CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7afa,2024-02-15T03:01:50.883000 -CVE-2024-24879,0,1,1422cad3ad9accd9aa029eb9d1c62dbe9e3a36357966aceb9c265cb2245cb4ff,2024-10-15T19:39:30.157000 +CVE-2024-24879,0,0,1422cad3ad9accd9aa029eb9d1c62dbe9e3a36357966aceb9c265cb2245cb4ff,2024-10-15T19:39:30.157000 CVE-2024-2488,0,0,9f9545c282e96006573210a989f186c5df3154a3513e0af714a0d9e2892e8aac,2024-05-17T02:38:15.413000 -CVE-2024-24880,0,1,417f1620a783691d55294b271631d28b4b974c4f2048f45d9f97fd0cbadb67a0,2024-10-15T19:41:39.670000 +CVE-2024-24880,0,0,417f1620a783691d55294b271631d28b4b974c4f2048f45d9f97fd0cbadb67a0,2024-10-15T19:41:39.670000 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 @@ -247493,7 +247578,7 @@ CVE-2024-26236,0,0,19d5aae98ae95db4c4d70f418437d84d96fc7ffa6eb3fc6e960d1fb32f039 CVE-2024-26237,0,0,4a5a46dfbaa9ee757c266cb06f5bdd3b7c9c9212350e3b3f940b0f5aa28b1fa2,2024-04-10T13:24:00.070000 CVE-2024-26238,0,0,f51ff6c77a18790c6e3fbd5916b9e4339c1fbba58d3f9a7dc1403152bf549147,2024-05-14T19:17:55.627000 CVE-2024-26239,0,0,b6bef41140cc2fe190d67ae538417b420d577a7d3675c65900e55846e1dc5504,2024-04-10T13:24:00.070000 -CVE-2024-2624,0,1,f8883c0ffc3c07e08d49666aeea251af0b4d5d0067045e6b3090117c94be39af,2024-10-15T18:49:16.667000 +CVE-2024-2624,0,0,f8883c0ffc3c07e08d49666aeea251af0b4d5d0067045e6b3090117c94be39af,2024-10-15T18:49:16.667000 CVE-2024-26240,0,0,469d109d7f6dbe34081d9860472aff3b4e252c2c74e78521b270d4e97c1e526f,2024-04-10T13:24:00.070000 CVE-2024-26241,0,0,ad49425919c070a9631331db70a22ebb9d6d5ba3446192474b9ed36e91182f09,2024-04-10T13:24:00.070000 CVE-2024-26242,0,0,87be43bdf41cad376dd7ec9618b8c7069b8c8b4a0eda2f8823d78d95a17b33c7,2024-04-10T13:24:00.070000 @@ -249917,7 +250002,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 -CVE-2024-2965,0,1,33064d8404a1f414503cee7ae4d0f3de7144ff0f58588fb6c3798d949ec71919,2024-10-15T18:55:04.863000 +CVE-2024-2965,0,0,33064d8404a1f414503cee7ae4d0f3de7144ff0f58588fb6c3798d949ec71919,2024-10-15T18:55:04.863000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 @@ -250164,7 +250249,7 @@ CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3f CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000 CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 -CVE-2024-29946,0,1,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 +CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 @@ -250573,7 +250658,7 @@ CVE-2024-30369,0,0,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e CVE-2024-3037,0,0,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000 CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000 CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000 -CVE-2024-30373,0,1,fd6dad9f528d4b818b9cd3b70c19f394231e81452601d5b071c636fca6b844b9,2024-10-15T18:23:52.207000 +CVE-2024-30373,0,0,fd6dad9f528d4b818b9cd3b70c19f394231e81452601d5b071c636fca6b844b9,2024-10-15T18:23:52.207000 CVE-2024-30374,0,0,4a829013b3c1a4609a76f5790d534eb221b5942a8caf978bc6991bfee50c426e,2024-09-26T14:22:20.047000 CVE-2024-30375,0,0,e38288bbc33b00a1927d2243b199eacbf12e85c7f7703d097b6b791a059430e2,2024-09-26T14:24:26.730000 CVE-2024-30378,0,0,b80140413aed971e52d27ba98a46e8aa758cf76f2f094e7fb695d089c0e62074,2024-05-16T18:15:09.407000 @@ -251013,7 +251098,7 @@ CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad3364253 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 CVE-2024-31033,0,0,4d406f18763dd0b76dcad0c910670ccd39d0be934836d2f67e309de926070782,2024-08-27T18:35:09.280000 CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 -CVE-2024-3104,0,0,41146c1247909754b7117b96d31ac0fa7400b130cc37088b720587f5c2469ae9,2024-06-07T14:56:05.647000 +CVE-2024-3104,0,1,8cb1e3d78797810d6f2eeb02cdfd953c9fad55c2a75933a6c8d2d71f4faeb068,2024-10-15T20:21:54.380000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 CVE-2024-31041,0,0,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000 CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000 @@ -251052,7 +251137,7 @@ CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51 CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000 CVE-2024-31098,0,0,e24dcc12ec80ae731570328b821bd8d0791f13fa285e0f7e54914b36600e2ab2,2024-10-09T17:02:55.033000 CVE-2024-31099,0,0,528ba98d88fb34d8f61e8485a4326c059785e996c72869ec228c224daf695f3d,2024-06-05T14:15:13.310000 -CVE-2024-3110,0,0,941507510a5619916ccbf8393eac1eb041a63ac5c15ffb37aea9308c4b7a05d9,2024-06-07T14:56:05.647000 +CVE-2024-3110,0,1,b87edf9f5fc48b7677898bcff3ba9c0901bcc20dc18616f78130a875412344fb,2024-10-15T20:01:31.567000 CVE-2024-31100,0,0,304afdd26a02a950739edd8b75999107f4a6aad6e328c60a5193227610b72d07,2024-04-01T01:12:59.077000 CVE-2024-31101,0,0,96305fcd171442dea8e11cd23a5a7bd2566c43ec2cc12a4af1219603bf179100,2024-04-01T01:12:59.077000 CVE-2024-31102,0,0,8e5e714e276b93e223db917c5ec9f49c14e344993e513bcb552ebc988ac0ee39,2024-04-01T01:12:59.077000 @@ -251678,6 +251763,7 @@ CVE-2024-31951,0,0,b251f1577f50282fe90266ab8c20a58dd7e6f3cc651d794f33ba3516646b4 CVE-2024-31952,0,0,3d77ea42e3c6b71ca78bc5c0c7985e6bde91a46241e6b9004033a640e8da9c8d,2024-09-06T19:35:20.623000 CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 +CVE-2024-31955,1,1,199848aa9c9b18847ec104f92aa4b9df114926151f814aaf17f008ef90902ad4,2024-10-15T21:15:10.690000 CVE-2024-31956,0,0,9c56384997ee12995d0e30a7f8f0ab04e153069838f415bd0e5a559ec646d264,2024-07-16T16:27:59.690000 CVE-2024-31957,0,0,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c02042898e2,2024-07-12T14:53:30.260000 CVE-2024-31958,0,0,416fc9a4d3e4a5d3047ec5c2778da02b0620ad75afe0364bc50bb13dddbd55a8,2024-06-07T19:24:09.243000 @@ -252398,7 +252484,7 @@ CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75df CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000 CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000 CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000 -CVE-2024-32873,0,1,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000 +CVE-2024-32873,0,0,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000 CVE-2024-32874,0,0,addb84ea881ea0feaefba19978b4f9ede845534ba6243cf8c5e6018bc364eb26,2024-05-14T16:12:23.490000 CVE-2024-32875,0,0,40aaa75f1201e42c5f0849be8614c0a4d622893733a69b13d08c130e0c9a1074,2024-04-24T13:39:42.883000 CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5823,2024-04-24T19:58:40.710000 @@ -253217,7 +253303,7 @@ CVE-2024-34075,0,0,5da4b38afe940e30356d7f8cfc346d6566a1ba741dea8ba465506ec525937 CVE-2024-34077,0,0,31442e851c955aa9945f0776918b7a4c11f8d38adcaf71b61df52b286a466749,2024-05-14T16:12:23.490000 CVE-2024-34078,0,0,9dfabba0f15cfcb159383479a7fa78dc12060b0d38698b03def607cb1411276a,2024-05-06T16:00:59.253000 CVE-2024-34079,0,0,047b20d453ed22b2c9238a036a318cfab2d6390422d9ac0a43a87d01bddd47f7,2024-05-14T16:12:23.490000 -CVE-2024-3408,0,0,324428315bee45d3aafd518b2834d944210598288988c14ae075750a99213d2d,2024-06-07T14:56:05.647000 +CVE-2024-3408,0,1,413c1c018f4649aa34534dd56ec0b30f2962607123afc4b2fdf24b42eb2c1afb,2024-10-15T20:14:21.870000 CVE-2024-34080,0,0,04e7d157cb56563e9b6ae3413063ef4f7c8897fff39cfc6fef6ee0c59786b5d4,2024-05-14T16:12:23.490000 CVE-2024-34081,0,0,59bd3a052213b2000050e90eb97869fd7a5e0bfd844a1f6ce493f930af4d6add,2024-05-14T16:12:23.490000 CVE-2024-34082,0,0,72145cae379aff6a1272d937f8ee0caba928404f9d12f9c0fb3d88b23848000f,2024-05-15T18:35:11.453000 @@ -254203,7 +254289,7 @@ CVE-2024-35580,0,0,a43fd10e129fd9e146689cfa2d63929069dd287ced1e3cf39c84ed52a8ef4 CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 CVE-2024-35582,0,0,2219b5579a19c25f0f78733ea0e4d22e0bdafa0a58bb93c103fdebb267edde75,2024-08-20T15:35:17.183000 CVE-2024-35583,0,0,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000 -CVE-2024-35584,1,1,c61e0d501e1d989580b5328f300efd5dcd9735c0a7006cd352a8a1802d08769f,2024-10-15T19:15:16.957000 +CVE-2024-35584,0,0,c61e0d501e1d989580b5328f300efd5dcd9735c0a7006cd352a8a1802d08769f,2024-10-15T19:15:16.957000 CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,27faac454b8155f287bc6ac35261d2d1913acb4129e9514b657e844f649215b5,2024-08-29T20:36:47.170000 CVE-2024-35592,0,0,c1fef65873ac1061d41e08db42afc69241a1ccc24e746aa460028428ca90ae7f,2024-08-20T15:35:17.980000 @@ -254850,7 +254936,7 @@ CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610dec CVE-2024-36260,0,0,eb0574ced86ce4421ec32797bfb96748b51a8c31102b417db4374d946aa9d144,2024-09-09T12:21:53.383000 CVE-2024-36261,0,0,c5e25a6ffc1d9b2b1a542491c796ec9c713e3656e35c75393a1c0c59fce58861,2024-09-23T14:16:44.273000 CVE-2024-36263,0,0,b19ce9bdaf5871a0e8a25ce5c3dd3fadaa21375012330812df4d2d32a979172d,2024-08-21T15:35:09.140000 -CVE-2024-36264,0,1,0a62131b07156b0179f3441bfe77f5b1ed091699b66e5976a0a8c084173d9a24,2024-10-15T18:46:46.633000 +CVE-2024-36264,0,0,0a62131b07156b0179f3441bfe77f5b1ed091699b66e5976a0a8c084173d9a24,2024-10-15T18:46:46.633000 CVE-2024-36265,0,0,12d738a1b4f63f0028c8f62cfbcac12211bd41f794fc3fcd67344ea579538e2e,2024-09-26T14:35:23.360000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 @@ -255103,10 +255189,10 @@ CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ff CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-3673,0,0,793bfe64393173ca9d6fad84c98d57e0015832a693f798ed6c4f8a051964a6cc,2024-08-30T19:35:06.567000 -CVE-2024-36730,0,1,47a1048d0cce3bd24213ea634eb12d347f4b856c9821af240d374fe9caf8bcaa,2024-10-15T19:25:24.773000 +CVE-2024-36730,0,0,47a1048d0cce3bd24213ea634eb12d347f4b856c9821af240d374fe9caf8bcaa,2024-10-15T19:25:24.773000 CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000 -CVE-2024-36735,0,1,616a14bca9c8563a817269ef367a8fc2b8ae8bda780dc4acd9d5028036ab3e05,2024-10-15T19:31:49.630000 +CVE-2024-36735,0,0,616a14bca9c8563a817269ef367a8fc2b8ae8bda780dc4acd9d5028036ab3e05,2024-10-15T19:31:49.630000 CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000 CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000 CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000 @@ -255272,21 +255358,21 @@ CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c CVE-2024-36980,0,0,e49231cf188398c0359917434170af1132681e7b8b4d7cdf62fdadcaa3a55c33,2024-09-26T20:53:57.597000 CVE-2024-36981,0,0,692e3253e54d255e568ff73285bb6cacdec70eb91eb30bd794acc0fdb33ebac4,2024-09-26T20:55:39.783000 CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000 -CVE-2024-36983,0,1,3d2671e3b6faad6837d39321277c4a087da43bfc9e171858dbd03f44fb9a4b06,2024-10-15T18:35:13.550000 -CVE-2024-36984,0,1,5ab2ac22a4ff5dc4e74e9156d2e3d10e3aab10ff6f84623eec6fcd6d6201a02d,2024-10-15T18:35:13.683000 -CVE-2024-36985,0,1,b797a67fe55aeafc6435df22b9723883504e6bd69623593e54049520578cd9da,2024-10-15T18:35:13.810000 +CVE-2024-36983,0,0,3d2671e3b6faad6837d39321277c4a087da43bfc9e171858dbd03f44fb9a4b06,2024-10-15T18:35:13.550000 +CVE-2024-36984,0,0,5ab2ac22a4ff5dc4e74e9156d2e3d10e3aab10ff6f84623eec6fcd6d6201a02d,2024-10-15T18:35:13.683000 +CVE-2024-36985,0,0,b797a67fe55aeafc6435df22b9723883504e6bd69623593e54049520578cd9da,2024-10-15T18:35:13.810000 CVE-2024-36986,0,0,19150827ddb5a5edfc4814b01ab21fdc0631b6b8b842914dd22329d1e779f69a,2024-08-02T15:24:42.677000 CVE-2024-36987,0,0,1d55b78de0429e0f9217425a916f7a81cae7e1ecd4aabcd3cf4385f4839c5aca,2024-08-02T15:21:54.573000 CVE-2024-36989,0,0,e29df74fff69a124cbba202c433c463e6aee8ba4fb035b75e2a80ecf4b180960,2024-10-10T11:58:28.630000 CVE-2024-3699,0,0,30b1531f872c88b7cbea0828fb395914bc791e58c332296f8abe3de89de3423a,2024-06-12T17:53:09.130000 CVE-2024-36990,0,0,c6ebb7eedce1b1630f254f51b2ec2bdff0ad362c70cf722357a5198ef0b015f1,2024-08-21T14:29:07.173000 -CVE-2024-36991,0,1,c7d9550d82ccdf9d656e7761cf6e8ead1b939e36f63a32cf976b15c461af5891,2024-10-15T18:35:13.927000 +CVE-2024-36991,0,0,c7d9550d82ccdf9d656e7761cf6e8ead1b939e36f63a32cf976b15c461af5891,2024-10-15T18:35:13.927000 CVE-2024-36992,0,0,abecdc4ff7a886a1f65deead5ea9a8254937cde8f8bba6a6817f94c9cd8353cb,2024-08-21T14:30:51.263000 CVE-2024-36993,0,0,7f59a560bfa90071fc78d38c16f79210d5ba47a0e83d9bb9c035ff8837c28bcc,2024-08-21T14:31:35.970000 CVE-2024-36994,0,0,5bcf467196c1b84a362932fda69af7a594fd1733711aa93db9e3192dd09151ba,2024-08-02T15:07:01.577000 CVE-2024-36995,0,0,001f01624b8476726d4d815467edb381482f5d309cf989b89173ce343b404752,2024-08-02T14:55:40.310000 CVE-2024-36996,0,0,5b2b9df71831d71bb4824acd46b570122cc17e69d17ce334c08a5d79406aaa97,2024-10-10T12:30:29.247000 -CVE-2024-36997,0,1,d26537886e67e2636705f692175341d9610e08b0875574e3e76efe2c198bbb04,2024-10-15T18:35:14.063000 +CVE-2024-36997,0,0,d26537886e67e2636705f692175341d9610e08b0875574e3e76efe2c198bbb04,2024-10-15T18:35:14.063000 CVE-2024-36999,0,0,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000 CVE-2024-3700,0,0,1f63c1e7ae5862d8303d1df0f80fb7224c65b53b248ffd3fb3ee320fd320cf52,2024-06-12T17:51:52.710000 CVE-2024-37000,0,0,eb7342d14f34edf9127b95014f2d19d18d4dda29c980fd9452975dec05564bca,2024-07-03T02:03:59.763000 @@ -255406,8 +255492,8 @@ CVE-2024-3715,0,0,a3f6e7a82320a6d7e6e6c69e7827898cea9e6e8692b09fe17381d67f1803ba CVE-2024-37150,0,0,ebe86994cf382db2f42db3a67da442aa16fa332cd6f1072a3ddf757a2ef9a966,2024-09-26T14:04:54.867000 CVE-2024-37151,0,0,8369ee3c4d467fa86763a95ad47c05c55ab1bf8ab2582315661b340a8d9a5c13,2024-07-12T18:46:55.207000 CVE-2024-37152,0,0,ac6f3acf11b3a1f516e05266cf8046e8001605f3fd121de5700d8dfd6dcff917,2024-09-18T12:51:04.430000 -CVE-2024-37153,0,1,9f4424de0035ce52fbc12758883da96bd3d6274fe3ec25134b2ea0b426063640,2024-10-15T19:40:12.917000 -CVE-2024-37154,0,1,dd0ccf9a2b9c80e8d5e5d3b5ee95b70b33aa0e3330c8531821fb592ab05146b2,2024-10-15T19:43:51.117000 +CVE-2024-37153,0,0,9f4424de0035ce52fbc12758883da96bd3d6274fe3ec25134b2ea0b426063640,2024-10-15T19:40:12.917000 +CVE-2024-37154,0,0,dd0ccf9a2b9c80e8d5e5d3b5ee95b70b33aa0e3330c8531821fb592ab05146b2,2024-10-15T19:43:51.117000 CVE-2024-37156,0,0,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000 CVE-2024-37157,0,0,a07622f963d285fd9e3dcfe8c8c66929285017ffcec83ca71975fa9dd7c880ca,2024-09-18T13:50:23.367000 CVE-2024-37158,0,0,d89015f3d5c7061659d9d0607cd8f932d19692ba0c53081aaf8195c4a3e4e008,2024-06-20T12:44:22.977000 @@ -256891,7 +256977,7 @@ CVE-2024-39319,0,0,fc55ad0d090f68867940d18aa2fde9c1bb5fedcab6c273e1d435217e3e041 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 -CVE-2024-39322,0,0,e1e5319d1d4fdaa7d690c7fd8d7c3451a17a0f4bfe4280d87c1770054fa25f84,2024-07-03T12:53:24.977000 +CVE-2024-39322,0,1,8a6f833e2e5859d26325a440879ddb727901e908055a5475811ec7335bdca55b,2024-10-15T20:47:03.383000 CVE-2024-39323,0,0,f9bbda9de9065c504f42e389e0c785c3032548b9fca5a4349b55a818885c8e4d,2024-07-02T17:44:45.700000 CVE-2024-39324,0,0,fafdc7b23deb4ba54d62822bb1dcadb6897982db9c0083057b0e2fe17a223ec1,2024-10-15T15:09:13.847000 CVE-2024-39325,0,0,36a6df8a9dd6378d32f603974a3befd580620f576115b1b3aed47cad5118326f,2024-10-15T15:14:13.083000 @@ -258109,6 +258195,7 @@ CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27 CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000 CVE-2024-4131,0,0,9a9dc3f28ed3cf5dc60a06ac74f038b77e708c032afa1341b54f35e0fc68ae43,2024-10-15T12:58:51.050000 CVE-2024-41310,0,0,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000 +CVE-2024-41311,1,1,a4873b34d46fd123edf52f54e36ced08601af514f62374f011fe50b9a364667b,2024-10-15T21:15:10.923000 CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000 CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000 CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000 @@ -258120,7 +258207,7 @@ CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000 -CVE-2024-41344,1,1,ff7648e8ae989269db49eecd8eade2bf67c01c04709c899061f7f40e7351972c,2024-10-15T19:15:17.287000 +CVE-2024-41344,0,1,4ff2b8b867724c4b29d5f408b15d55adf3bcaa4809b9ef2c2dd5fe098bb66791,2024-10-15T20:35:11.023000 CVE-2024-41345,0,0,ad86d7e7395244aeefb4513ee22ed35e62fdc5af64583f081b4b5d8d7fb51f54,2024-09-04T14:17:57.747000 CVE-2024-41346,0,0,1adac0ec66721c6669287245d0fb70166e2ec17c4be292036b9085702109e039,2024-09-04T16:05:09.933000 CVE-2024-41347,0,0,89b16501f9998c45192ab464895dbba53a76bd7b2944c225500c1ee4223ff754,2024-09-04T16:05:47.790000 @@ -258402,7 +258489,7 @@ CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a0 CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 CVE-2024-41856,0,0,3ada3c844b80f59e9ae3d36b6d9ea2fc582aae7cd70642ad9bb38d1ef0f68cd7,2024-09-13T09:15:08.907000 CVE-2024-41857,0,0,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000 -CVE-2024-41858,0,0,0b2aa1223d8b75ef4509a2c890063b1cbd2e1ef2deb50b762503d032e69fdb08,2024-08-14T13:00:37.107000 +CVE-2024-41858,0,1,12a5ad7cbf1ddb53a51c25c56cbd2b64134a36ddd97f51e12c7d3bc65410a988,2024-10-15T20:51:31.423000 CVE-2024-41859,0,0,53bf4aeb143d9af2209be69a1a50fd4315b77e19bdf2dd5873464dd453800711,2024-09-13T16:53:51.707000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41860,0,0,a6ec640882508023af3d0255006bb74c8ca989e8b14eb4eb3a86ff4f7bf11942,2024-08-14T18:19:25.823000 @@ -260028,6 +260115,7 @@ CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474 CVE-2024-44333,0,0,d4fac21295587aa2979fd79e1578e51567e5183cd9197e256154e36309cd2381,2024-09-09T21:35:11.347000 CVE-2024-44334,0,0,27220524666d063359048a7f3de8a9bf531c5b74b035bcd3d68284cc277b9a46,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,bea255eb7004ca14c44e24d39ca0678896b2d706dfe75c727ca75c52a4a40bff,2024-09-09T20:35:17.330000 +CVE-2024-44337,1,1,bc77c00a85cb63869b50676e7d38c5aa48f683f63cb488e28293e06ccd1d2673,2024-10-15T20:15:21.850000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000 @@ -260053,9 +260141,9 @@ CVE-2024-44408,0,0,bceaf662d92e59640c5be45332f34cf4bf71aab9d4c102f8b4268d666b8b7 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac456c,2024-09-10T19:00:29.527000 CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000 -CVE-2024-44413,0,0,65f2e8e22133659e3a7937580fccddc1fa58bd167ce5cbf4cb585b1f7a67f796,2024-10-15T12:57:46.880000 +CVE-2024-44413,0,1,458511e8071bf5c56bc79c7ff5020c1cc65eaec1dd7c17b54abf31cf1bf3d6a9,2024-10-15T21:35:28.267000 CVE-2024-44414,0,0,cd610a7106dcc832e2a39a0515b94b8e03a77d238ac215270113c2f6bc9117c6,2024-10-15T12:57:46.880000 -CVE-2024-44415,0,0,655af819c0debce238dfa0f7f56d452f9b59bdd69a7f2941e748ce3cef284d2c,2024-10-15T12:57:46.880000 +CVE-2024-44415,0,1,5b276220a6be6134b1aac018095be5c3016b588a6cd635733fde1e565ba9ec74,2024-10-15T21:35:29.017000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 CVE-2024-44430,0,0,f640e237da24007d6a0c1a8b89d52bdbc13fc34691f8dcc93f05041c29090cb1,2024-09-19T01:38:06.317000 @@ -260146,6 +260234,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 +CVE-2024-44775,1,1,a26b847e30f7216d6839516a57ec6105ca500aa33c895394a170c6378efb468b,2024-10-15T21:15:10.990000 CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000 CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93cf1a,2024-09-03T18:33:38.413000 CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000 @@ -260159,7 +260248,7 @@ CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000 CVE-2024-44798,0,0,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000 CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 -CVE-2024-44807,0,0,e8c5b3c4d9a3d80972d1eb031e969004994163dce986814689fc511ebbb9f025,2024-10-15T12:57:46.880000 +CVE-2024-44807,0,1,62c2b8a7567d7a7c61c3dd691038c78c799cdde1b88696256483cc85f3e669e5,2024-10-15T21:35:29.807000 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 @@ -260889,7 +260978,7 @@ CVE-2024-4618,0,0,c37ae26f2e1f44a703054cee4816ca3bf0ad845eefa4a632c5bbef4a4e755f CVE-2024-4619,0,0,4a40c989d02466215a13e8ebc90eedd665aa01db8dc0a625ac187e77f54f90ad,2024-05-21T12:37:59.687000 CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd702,2024-07-12T16:12:03.980000 CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 -CVE-2024-46215,0,0,6088b1af2b5f56d01d9a229189ca9bdc4f06d4663db151735c4a445892a1cace,2024-10-15T12:57:46.880000 +CVE-2024-46215,0,1,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370a31,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 CVE-2024-46237,0,0,a0f64eb1e4641e71cda28150c6a7085b4f541a320eaa50e27b069ce565fe1cfc,2024-10-10T12:51:56.987000 @@ -260960,7 +261049,7 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188 CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 -CVE-2024-46468,0,1,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000 +CVE-2024-46468,0,0,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000 CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000 @@ -261387,8 +261476,8 @@ CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b2 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000 CVE-2024-47134,0,0,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000 -CVE-2024-47135,0,1,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 -CVE-2024-47136,0,1,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 +CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 +CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -261837,13 +261926,13 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 -CVE-2024-48249,0,1,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 +CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000 -CVE-2024-48253,0,1,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000 +CVE-2024-48253,0,0,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000 CVE-2024-48255,0,0,313b410d31dd8621f0d7faab3c11bc5341a96c35dca7329f3a83e566161ad534,2024-10-15T12:57:46.880000 -CVE-2024-48257,0,0,aaadd224a47f274d472be6ce08b5d69075572392f21cee0f372452df54632bb8,2024-10-15T12:57:46.880000 -CVE-2024-48259,0,1,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 +CVE-2024-48257,0,1,9f5631e693f5ccf56007259ca7fa4278ab31fa9e4d26cb7e4af7e2a3dfb55f8a,2024-10-15T20:35:12.940000 +CVE-2024-48259,0,0,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 CVE-2024-48278,0,0,1989401114df78ae2b738db10dc761dd7c87f5042e958dd73b1ad8ae21b3fdde,2024-10-15T15:35:17.077000 @@ -261858,6 +261947,7 @@ CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab228 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 +CVE-2024-48411,1,1,b2d2dfce248e61f6aaf7436bd9f660dbebb21e3a02bc3bb6a908a2c53a8aba43,2024-10-15T21:15:11.060000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 @@ -261876,9 +261966,9 @@ CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b94 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 -CVE-2024-48622,0,0,980c56ef0d1700c69a05a060c6a491b5f8e60fe341396b57dff705be81d09548,2024-10-15T16:15:05.680000 -CVE-2024-48623,0,0,e8e3c9332b5c8204410a6fbbe6d65618def700fdad0cf7393579a2c6b88740f9,2024-10-15T16:15:05.767000 -CVE-2024-48624,0,1,f2be1358a87a4e8adff25895a95d7dab79bd042822ea0feed2b936938384ac0d,2024-10-15T18:35:16.363000 +CVE-2024-48622,0,1,ba30c8b7028e567048502ec8f136da253ab6291733e9ecfbab5f12369de3e455,2024-10-15T21:35:31.373000 +CVE-2024-48623,0,1,98e2d9050d0a6d7ed26d0f5a99daf6be14d6ae1673928c541868d3f0c0e16311,2024-10-15T21:35:32.163000 +CVE-2024-48624,0,0,f2be1358a87a4e8adff25895a95d7dab79bd042822ea0feed2b936938384ac0d,2024-10-15T18:35:16.363000 CVE-2024-4863,0,0,a7452bc03047df9dfe2f17de61b10d1bcd60cf90a2b2dad4486f933b8b326310,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 @@ -261886,32 +261976,40 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 +CVE-2024-48710,1,1,9dbb87b39f2d5758c262cf1d42fe6a72748ee26c2f9033eb3d0b3f3a0db92cea,2024-10-15T21:15:11.123000 +CVE-2024-48712,1,1,6fa4527eea8e9401893181048be23c1b5684445be1ad97147eb8529586076aa4,2024-10-15T21:15:11.177000 +CVE-2024-48713,1,1,78949fb9e0016f5dd127bc313460614265bffd9f88d73d1c1d9077aa53b9b8f5,2024-10-15T21:15:11.227000 +CVE-2024-48714,1,1,29ad77205ff317d626ff6e6b9ca922cf7757040bc17f4881a3ceeebb790daf76,2024-10-15T21:15:11.277000 CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 -CVE-2024-48768,0,0,ca8de8e07b0f4e68695a45f656c413c10b94b260fe52ed672054ce66c06a9fb6,2024-10-15T12:57:46.880000 -CVE-2024-48769,0,1,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000 +CVE-2024-48768,0,1,91e2c6ddcec0eefa58d2f68380e387364241aaf16f381d6cb6f91314ddf06c84,2024-10-15T21:35:32.950000 +CVE-2024-48769,0,0,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000 CVE-2024-48770,0,0,a5f9413e80eaeb5bd8cc7305118d9d871b4a6f4a982e875ef049dbc556cc75cb,2024-10-15T17:35:07.440000 -CVE-2024-48771,0,0,7cc16fb1e7b182ba1707e039c92b376a12b4f5c194ecd59d33b42309a06ec623,2024-10-15T12:57:46.880000 -CVE-2024-48772,0,1,976a3e2889a545044e2211b5dd62f039b94e0c74df9ae926e2ac2fb4a96d0f16,2024-10-15T19:35:40.267000 -CVE-2024-48773,0,0,fb43d7aa77de082965363f581f54c3d061652fad69676731f89ae7cab058f131,2024-10-15T12:57:46.880000 +CVE-2024-48771,0,1,2226959c10217b18491e6070a8703cc407118c9e469cf5dde5350c035d1eebc0,2024-10-15T21:35:33.747000 +CVE-2024-48772,0,0,976a3e2889a545044e2211b5dd62f039b94e0c74df9ae926e2ac2fb4a96d0f16,2024-10-15T19:35:40.267000 +CVE-2024-48773,0,1,c244d306a97486ff0c4176aea37ecc5f8b3a4b3172d544682d230147146de9cc,2024-10-15T20:35:14.183000 CVE-2024-48774,0,0,d20edaaf1d024afe7f584acc048e0777c96bfc6984585e77dc1e01adfd6f8e5c,2024-10-15T12:57:46.880000 -CVE-2024-48775,0,0,f5669ae425289b72e71d7a60ceabc6022280b7646d6dac15ce5178659cbc0334,2024-10-15T12:57:46.880000 -CVE-2024-48776,0,0,b89d40e78c84d47e76ba1de04c88609484eadc9d4130b8e88457197ed2b471ee,2024-10-15T12:57:46.880000 -CVE-2024-48777,0,1,54c3f1ea2e45e8317008bb4fa68d7dedc38bc1a3751236b3d316d88496c43ce3,2024-10-15T19:35:41.067000 -CVE-2024-48778,0,1,84465a6cd0aeb1f5e7a79a50b406c02904acdaa29d8045952a59d45351acb806,2024-10-15T19:35:41.840000 -CVE-2024-48784,0,1,b17d7d33d987ccc732abbbed7a19a2cd24322765e46d4a5e12c5048ecd3b3022,2024-10-15T19:35:42.627000 -CVE-2024-48786,0,1,356725ffde0ce97cc052a45790af4a3778948dfbfe170e13c7ea8d62a13a4603,2024-10-15T19:35:43.413000 -CVE-2024-48787,0,1,6d2ea7e3a85defa8b6f92bcb4641f0fb3472eedc1d016221be7f4707cb95d1ae,2024-10-15T19:35:44.190000 -CVE-2024-48788,0,1,d49daeb800740f0e90355e5fab9ca765541a870f5f806cc24938c90cbcb96ed5,2024-10-15T19:35:44.980000 +CVE-2024-48775,0,1,940fbfa8d4ec1455222baf7874279f0ea391a0f0cd6a583076cabf98424ed3cf,2024-10-15T20:35:14.947000 +CVE-2024-48776,0,1,af432ddb24c7bcb7ce84fc64dfda91ca17d324ea8a4b812d9d11a65d3b30fed3,2024-10-15T20:35:15.697000 +CVE-2024-48777,0,0,54c3f1ea2e45e8317008bb4fa68d7dedc38bc1a3751236b3d316d88496c43ce3,2024-10-15T19:35:41.067000 +CVE-2024-48778,0,0,84465a6cd0aeb1f5e7a79a50b406c02904acdaa29d8045952a59d45351acb806,2024-10-15T19:35:41.840000 +CVE-2024-48779,1,1,c3a9c2021e6c1b4396243f93f91837744a7b302417b8db4efb5c27ba34be6bc9,2024-10-15T21:15:11.340000 +CVE-2024-48781,1,1,5b3fc45bf8e024d5c6f9e1a5abcf76b99371df92998915a4f8160a95a8f2ce8e,2024-10-15T21:15:11.400000 +CVE-2024-48782,1,1,b41d959e58c873a74b213ff66afe62af39105d355b208990e0143ebb0bdb21e1,2024-10-15T21:15:11.450000 +CVE-2024-48783,1,1,da2a135321e8520fd818fa85c8d9cad3e2b1ad82fb112814f0626abd748cbb0e,2024-10-15T21:15:11.510000 +CVE-2024-48784,0,0,b17d7d33d987ccc732abbbed7a19a2cd24322765e46d4a5e12c5048ecd3b3022,2024-10-15T19:35:42.627000 +CVE-2024-48786,0,0,356725ffde0ce97cc052a45790af4a3778948dfbfe170e13c7ea8d62a13a4603,2024-10-15T19:35:43.413000 +CVE-2024-48787,0,0,6d2ea7e3a85defa8b6f92bcb4641f0fb3472eedc1d016221be7f4707cb95d1ae,2024-10-15T19:35:44.190000 +CVE-2024-48788,0,0,d49daeb800740f0e90355e5fab9ca765541a870f5f806cc24938c90cbcb96ed5,2024-10-15T19:35:44.980000 CVE-2024-48789,0,0,5f592c36436047d58bf382ebdc10d7cfe3a178af546d803f30cd03c06e0e8ad4,2024-10-15T15:35:19.560000 CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 CVE-2024-48790,0,0,ceda703837f83637982efb81eeabebf961c0a8457d3c931aa6c365425a142c37,2024-10-15T12:57:46.880000 CVE-2024-48791,0,0,cee0a23c7df15be93fddb008f000fe0bf9be40f59d5c9806b782ce26b20a6a61,2024-10-15T15:35:19.917000 CVE-2024-48792,0,0,f0468a8723df3ecc044b28f7bf95d6c4f917c9f33598ee95b354cbcc674cafbd,2024-10-15T15:35:20.183000 -CVE-2024-48793,0,0,dae7e208b54b46b9b3b2ea5a99cfd6703dd4b418e372d8815ac028cc55c60587,2024-10-15T12:57:46.880000 +CVE-2024-48793,0,1,d60db5162195c233da466b1dfce9be08b3c0ca1d20d0bb55e0a4937af9154f66,2024-10-15T21:35:34.713000 CVE-2024-48795,0,0,3ba44c809bccc74424c36040f3837b0bb086ec1f910a55507b2cf216568d50ad,2024-10-15T12:57:46.880000 CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000 CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000 @@ -261931,7 +262029,7 @@ CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b2 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,52d3f21edee01fa1b7d50228c23ad770da0e07dcc70157700a078948f8463c9b,2024-06-07T14:56:05.647000 -CVE-2024-4889,0,1,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 +CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 CVE-2024-48902,0,0,4705ef2c55813b3d84116179c2f627380e6bdeb3958de084a14cde58a5b57f28,2024-10-10T12:51:56.987000 CVE-2024-48909,0,0,9f043bbad446a771de31685005b4aaec51407994137d3dc87a7597202df7de61,2024-10-15T12:57:46.880000 @@ -261939,10 +262037,10 @@ CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c0 CVE-2024-48911,0,0,e0b0f376339137788c8f5f310259d6e022437aed42d17513390da35e83b91690,2024-10-15T12:57:46.880000 CVE-2024-48913,0,0,37dd6c652ace131411a1e5015973d721dfff292a443bb2cd2e9a123fa40fa498,2024-10-15T16:15:05.960000 CVE-2024-48914,0,0,475d5c9171a024fc7321a4edcc7825561f09062c68d4829f0d88af27fe9ab80e,2024-10-15T16:15:06.270000 -CVE-2024-48915,0,1,436abbcaa0bec3654a766e3739fdf6000c3bf80c7e442d11f7ecd8d059ad5b32,2024-10-15T19:35:45.867000 +CVE-2024-48915,0,0,436abbcaa0bec3654a766e3739fdf6000c3bf80c7e442d11f7ecd8d059ad5b32,2024-10-15T19:35:45.867000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 -CVE-2024-48933,0,1,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 +CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 CVE-2024-48937,0,0,fb3aa1360cb042294647ae67e18ab591b2f48004999a7cd6a26f133ca6565fb4,2024-10-15T12:57:46.880000 CVE-2024-48938,0,0,3d30d33d5321768a3f65e3940b0730e05bbd4ff5e3d997465431f4cb5c46177b,2024-10-15T12:57:46.880000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 @@ -261979,6 +262077,7 @@ CVE-2024-4917,0,0,6cef1f1b9c67b0bba74556ced18fc262fe370a97a734fa36d53272fcc01b0d CVE-2024-4918,0,0,d46f8a4fb764a0404096a5c058a93218c921ca6c4bf015a8f26430856edda636,2024-05-17T02:40:42.037000 CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d877,2024-06-04T19:20:53.633000 CVE-2024-49193,0,0,2fb765324a8f2d36d4e9310c3432afa1ec5d25e41e48c037c8d4a9b584ba6a95,2024-10-15T12:57:46.880000 +CVE-2024-49195,1,1,6d5c146e497ca60621c13ed6c4c51cc55f9cdd2bbce4ce5dca322bb7a23b52ad,2024-10-15T20:15:21.950000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 @@ -262711,7 +262810,7 @@ CVE-2024-5742,0,0,c310dd28e6218f94af8f7597fa59ff6226be5f6bc18ba1f4cf6bdcb5be3777 CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 -CVE-2024-5749,1,1,3106234ad189b55b90e3d5371ca0e65ff3bc48acf1c8a0659ef6ef2ef2bf0543,2024-10-15T18:15:05.997000 +CVE-2024-5749,0,0,3106234ad189b55b90e3d5371ca0e65ff3bc48acf1c8a0659ef6ef2ef2bf0543,2024-10-15T18:15:05.997000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,665d058ed530ae61eb83388b4a703659e3453f6012f62fa19adedb27d3fa9b05,2024-09-20T18:01:44.533000 CVE-2024-5753,0,0,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000 @@ -263798,7 +263897,7 @@ CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f8946 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca45054,2024-08-31T03:02:41.763000 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 -CVE-2024-7038,0,1,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 +CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 @@ -265022,7 +265121,7 @@ CVE-2024-8686,0,0,022931d7d759e19b0434bc52cbdd6347bb39936f99eb55db4994112c6b1c44 CVE-2024-8687,0,0,acaaec34cb53b28ae166b73ca3b7beb76d1056832fd2f401fa104cfe417cf027,2024-10-03T00:26:56.110000 CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68fd,2024-10-03T00:19:32.047000 CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 -CVE-2024-8690,0,1,eb968451e4e62166b7c59305af1ec818435c2d81bb22259d4694cffd92b8d03d,2024-10-15T18:38:32.260000 +CVE-2024-8690,0,0,eb968451e4e62166b7c59305af1ec818435c2d81bb22259d4694cffd92b8d03d,2024-10-15T18:38:32.260000 CVE-2024-8691,0,0,86e4139a64d9b51ddc9d346ef3726cdbb0eca03f25fc24c1e79857eafd0831a5,2024-09-12T12:35:54.013000 CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000 CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 @@ -265371,7 +265470,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,1,dd0e44bc8e2097c098fb36058bfb22e7ad9d27e180476832b369b29945d74b86,2024-10-15T19:15:17.707000 +CVE-2024-9341,0,0,dd0e44bc8e2097c098fb36058bfb22e7ad9d27e180476832b369b29945d74b86,2024-10-15T19:15:17.707000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -265429,14 +265528,15 @@ CVE-2024-9465,0,0,add9f556a2a76282938e69631466c01e7fcb9a0d783603fabcb3a9a8f6f9d5 CVE-2024-9466,0,0,4056ea73cc1df707db4f05bb2a6ab96565812ace99f5afd63580b9c827e5636d,2024-10-15T15:08:55.420000 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 -CVE-2024-9469,0,1,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 +CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 CVE-2024-9470,0,0,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 -CVE-2024-9473,0,1,825f3e5d710ec92d62a1f5ebd2a2dd44d1120fd5e69e5435fa3d2066e6d99e08,2024-10-15T18:54:54.560000 +CVE-2024-9473,0,0,825f3e5d710ec92d62a1f5ebd2a2dd44d1120fd5e69e5435fa3d2066e6d99e08,2024-10-15T18:54:54.560000 CVE-2024-9481,0,0,dce581617d5cf6edbc62a2fe02f71507870c412f67698e0495feb9e6b8ee0972,2024-10-04T13:50:43.727000 CVE-2024-9482,0,0,10c3c4a119489ce5d129acd1f72184e55e1f72d2675c976690dcbbc5d407b533,2024-10-04T13:50:43.727000 CVE-2024-9483,0,0,6a9a1cfe421d679c621a2969a64278be9b39bdca7774e9b4a3235c5640b6357b,2024-10-04T13:50:43.727000 CVE-2024-9484,0,0,3f1e4bdc376cc95b97b5c0150a8d7b1a17051d92adc32b058eb06edb62f443eb,2024-10-04T13:50:43.727000 +CVE-2024-9486,1,1,9c2552e2cd15b335a6d6d614c3642a4a0b33048337775740f4a53fde4d8f6d4f,2024-10-15T21:15:11.573000 CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 CVE-2024-9506,0,0,1b9faa7ea92c6eb294076b1b1dafc59deb1bacd745dcd940153d30384a0a3ce0,2024-10-15T16:15:06.650000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 @@ -265490,6 +265590,7 @@ CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 +CVE-2024-9594,1,1,9b3ea574fc0e743b285b7d205ae84f41618a5376ea131a6c68fa93de1da596c5,2024-10-15T21:15:11.790000 CVE-2024-9595,0,0,6e91591cc8fc6f8664de9cf116e0c3ff35185abd26eee85b7100e07838bd2f63,2024-10-15T12:57:46.880000 CVE-2024-9596,0,0,e9ee6223c4ba2626fe5acdfa0aeb59c3c18c32202e4516b5ff779e917fbff784,2024-10-10T12:51:56.987000 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 @@ -265505,7 +265606,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 -CVE-2024-9676,0,0,adf46a01644c0b5011ec1c0db0d0631e1b3a4d9e1974ae046ccbb83f76e08c4a,2024-10-15T16:15:06.933000 +CVE-2024-9676,0,1,903e6d5f02c4a43f5c3ca99775f28e93c82e9a2cb492044d1a2fbd884a874cfd,2024-10-15T21:15:11.990000 CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9687,0,0,892b3ec492b9f76dc48c1c64fed3d122004a3f16f1ff48bd4dbf12570db9abe9,2024-10-15T12:57:46.880000 @@ -265528,23 +265629,23 @@ CVE-2024-9789,0,0,0b7e270cf4baeae63b135180c0b00e3345c02df6dc92f399d94198cc5dcc2f CVE-2024-9790,0,0,14c4372898279ac90fde78cce4001f6f1e8b4b9eda1cf1e99e5ebf775cc5b4c6,2024-10-15T12:58:51.050000 CVE-2024-9792,0,0,d68aca032770f3ab555b174d9c980d2b9c8b7e1f4d87418bf0969c937a5a85c0,2024-10-15T12:58:51.050000 CVE-2024-9793,0,0,0f71c88bb614b0080f91ce00289e6f60c39b1d1486897ebc6c960c3d831b128b,2024-10-15T12:58:51.050000 -CVE-2024-9794,0,1,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 -CVE-2024-9796,0,1,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 -CVE-2024-9797,0,1,76d0d64f17ede2284b5f27cd006706a5a6cf138e624975afba6fbae8df1636b1,2024-10-15T19:14:42.600000 +CVE-2024-9794,0,0,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 +CVE-2024-9796,0,0,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 +CVE-2024-9797,0,0,76d0d64f17ede2284b5f27cd006706a5a6cf138e624975afba6fbae8df1636b1,2024-10-15T19:14:42.600000 CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000 CVE-2024-9799,0,0,7cb01e604d6eac6e5a3859204aba429f0c165ddde47994b62794b11c93d01e84,2024-10-15T12:58:51.050000 CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 CVE-2024-9803,0,0,c198e0f40a9e86d3c4f20656e7a7e2143c76b9f81b8509b1d0c40b2503cd6b64,2024-10-15T12:58:51.050000 -CVE-2024-9804,0,1,68f5c7e14739a6361e19dd7d813977d666aa17ad23eace3ce2a17d5ea8fdec35,2024-10-15T19:17:27.083000 -CVE-2024-9805,0,1,ee00c11b4d31e847e0ebd53a130c82f569b78de6fc7dd36fd6219e14679cf80b,2024-10-15T19:18:27.987000 +CVE-2024-9804,0,0,68f5c7e14739a6361e19dd7d813977d666aa17ad23eace3ce2a17d5ea8fdec35,2024-10-15T19:17:27.083000 +CVE-2024-9805,0,0,ee00c11b4d31e847e0ebd53a130c82f569b78de6fc7dd36fd6219e14679cf80b,2024-10-15T19:18:27.987000 CVE-2024-9806,0,0,2a19b98163bbc19db8559bafff0a76ba4932387d3b8511ad3780630baad612c8,2024-10-15T12:58:51.050000 CVE-2024-9807,0,0,78a38d043b1962fb3571036d21641177bef4e7c8d56e6b70ccb1a7373eaaec64,2024-10-15T12:58:51.050000 -CVE-2024-9808,0,1,8cb37bc0987e5d1a9cd6e2e2fdc996dda3265bb7143c31d3e644a0c1f12bc2e9,2024-10-15T19:19:57.720000 -CVE-2024-9809,0,1,6a6378bfa76c432c34db3affd586d6db82005db89ffbb959913ee66d0494ec0e,2024-10-15T19:21:13.343000 -CVE-2024-9810,0,1,c1986a5d4762fc2b8cf5273afd6cc2193d22cf0f70a679146d48fbe94e3902f2,2024-10-15T19:22:00.260000 -CVE-2024-9811,0,1,1da541f99caffc6ef33768ad0c7e75efe4945fef39464cf1fdbfee5cf8c9e1bb,2024-10-15T19:22:35.447000 -CVE-2024-9812,0,1,f7c2d67f254da57e92f97292917f047072a690b4b64d871b69e515fdcb45b363,2024-10-15T19:22:51.340000 -CVE-2024-9813,0,1,ebf8d991a9c56aa1f46b8a521fcad95d28b775470618a7a18b02317ab25ddfe0,2024-10-15T19:23:28.953000 +CVE-2024-9808,0,0,8cb37bc0987e5d1a9cd6e2e2fdc996dda3265bb7143c31d3e644a0c1f12bc2e9,2024-10-15T19:19:57.720000 +CVE-2024-9809,0,0,6a6378bfa76c432c34db3affd586d6db82005db89ffbb959913ee66d0494ec0e,2024-10-15T19:21:13.343000 +CVE-2024-9810,0,0,c1986a5d4762fc2b8cf5273afd6cc2193d22cf0f70a679146d48fbe94e3902f2,2024-10-15T19:22:00.260000 +CVE-2024-9811,0,0,1da541f99caffc6ef33768ad0c7e75efe4945fef39464cf1fdbfee5cf8c9e1bb,2024-10-15T19:22:35.447000 +CVE-2024-9812,0,0,f7c2d67f254da57e92f97292917f047072a690b4b64d871b69e515fdcb45b363,2024-10-15T19:22:51.340000 +CVE-2024-9813,0,0,ebf8d991a9c56aa1f46b8a521fcad95d28b775470618a7a18b02317ab25ddfe0,2024-10-15T19:23:28.953000 CVE-2024-9814,0,0,909acc5669e0933797959b0f41ad905b48ee6338c8fb12bc92a4d2dcabca5f68,2024-10-15T12:58:51.050000 CVE-2024-9815,0,0,3efadeccbd9056fc1482d694efde2ac99851dc1cec21b9808ae962cd6dc508bc,2024-10-15T12:58:51.050000 CVE-2024-9816,0,0,cb20564cea99b9db0854ced1c2220742827ad9a1167949cee8f49b0272321d69,2024-10-15T12:58:51.050000 @@ -265558,7 +265659,7 @@ CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca42489 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000 -CVE-2024-9859,0,1,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000 +CVE-2024-9859,0,0,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000 CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000 @@ -265588,13 +265689,26 @@ CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425 CVE-2024-9944,0,0,0105315be1482473acf9cccf2807cd53dd651f41a7a3739bca8c3d692de03102,2024-10-15T12:57:46.880000 CVE-2024-9952,0,0,75bf1164383c64f84aaae3ebb54926536c4d8cc1bc9810fac6b8f11ba1e426eb,2024-10-15T12:57:46.880000 CVE-2024-9953,0,0,d4420057cd6ff540e58057e827a120bd402b45b9e9ab6580a72e462bb02065ee,2024-10-15T15:15:13.660000 +CVE-2024-9954,1,1,d1165869fc33e5b3518e409cac338986016cb980d3fb2465c5da782ff3634fbe,2024-10-15T21:15:12.110000 +CVE-2024-9955,1,1,d5511da7de211929750402c6d0a55ece05d06d79332a45148ea952fc32f5f61c,2024-10-15T21:15:12.193000 +CVE-2024-9956,1,1,d680a07f37e8304fbadbae77c6597afd1d58433560d77a2f2f4297a613516f59,2024-10-15T21:15:12.267000 +CVE-2024-9957,1,1,557b21d1ae428230bd0e97570f46b338e058675a2b364e8c27205b420cadba39,2024-10-15T21:15:12.320000 +CVE-2024-9958,1,1,5fb083a3fbbc027917364550172e3d3516725c34f3fcc6306e8146e90fcfde24,2024-10-15T21:15:12.397000 +CVE-2024-9959,1,1,c26a7b7c7c534c9e8a9cd7fb5d7c53c2fb14dc0e136d7dcb703c1866d711523e,2024-10-15T21:15:12.447000 +CVE-2024-9960,1,1,1e7a8f0bad82dd2acf9bae58c8745bf95997989d0e9ed7fec0f622f8abcc9d96,2024-10-15T21:15:12.520000 +CVE-2024-9961,1,1,db0bfa81a077cce1cce3ad6c797f322ab13eec8916c5958041b1c3c70f8612ef,2024-10-15T21:15:12.597000 +CVE-2024-9962,1,1,9d727be4de33f8d679decbcb522f194d666cb1da505a3504a900ab9ac9cbfec7,2024-10-15T21:15:12.670000 +CVE-2024-9963,1,1,b5805da099a5887a19038aebd7d92707f60dd02d811c1904ac32b1587626b964,2024-10-15T21:15:12.723000 +CVE-2024-9964,1,1,8bff54fbb6c1207852f3289264206df5cba7909835ed73d2748e3497d374fb65,2024-10-15T21:15:12.790000 +CVE-2024-9965,1,1,a355720335699212db5a8d3a45c8b197fb0f6e057847695dd46084b58c6b30c3,2024-10-15T21:15:12.837000 +CVE-2024-9966,1,1,f33784baf8a57a2d9fc425d3f109ec52b883c5449c72eea3c7058c129e55f861,2024-10-15T21:15:12.890000 CVE-2024-9968,0,0,9fec2696a80768f737aab9f26a286c9e61b39eb654e16aa50bcb405c6becb33a,2024-10-15T12:57:46.880000 CVE-2024-9969,0,0,b88b6c4d3144ed615cd4311477b588678016590767983c0a36b38fc380f9987d,2024-10-15T12:57:46.880000 CVE-2024-9970,0,0,f001ac5abb7acc6ee06697c87a0cadac78ed1edd27d729d7f3d33875ec6b0a19,2024-10-15T12:57:46.880000 CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2c8,2024-10-15T12:57:46.880000 CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000 -CVE-2024-9973,0,1,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 -CVE-2024-9974,0,1,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 +CVE-2024-9973,0,0,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 +CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 CVE-2024-9975,0,0,19a95b0d8594378de1a658f6110dd6917411d1ac6b44da217f59a38aaf420a6d,2024-10-15T12:57:46.880000 CVE-2024-9976,0,0,a0343d2773336f2452d12e06f8ed1c829d33d78887485939f459af0a85f318bf,2024-10-15T12:57:46.880000 CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000